Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-1390 (GCVE-0-2023-1390)
Vulnerability from cvelistv5
Published
2023-03-16 00:00
Modified
2025-04-23 16:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Linux kernel (TIPC kernel module) |
Version: Fixed in kernel 5.11-rc4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:49:11.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "tags": [ "x_transferred" ], "url": "https://infosec.exchange/%40_mattata/109427999461122360" }, { "tags": [ "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0001/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-1390", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T13:26:35.899836Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T16:23:37.728Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Linux kernel (TIPC kernel module)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in kernel 5.11-rc4" } ] } ], "descriptions": [ { "lang": "en", "value": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1050", "description": "CWE-1050", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-20T00:00:00.000Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "url": "https://infosec.exchange/%40_mattata/109427999461122360" }, { "url": "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6" }, { "url": "https://security.netapp.com/advisory/ntap-20230420-0001/" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-1390", "datePublished": "2023-03-16T00:00:00.000Z", "dateReserved": "2023-03-14T00:00:00.000Z", "dateUpdated": "2025-04-23T16:23:37.728Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-1390\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2023-03-16T21:15:11.447\",\"lastModified\":\"2025-04-23T17:16:25.377\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1050\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.3\",\"versionEndExcluding\":\"4.9.253\",\"matchCriteriaId\":\"AF22C9B4-BCE0-4E42-8C4C-5DAE22C582DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.217\",\"matchCriteriaId\":\"D777E229-ADCF-4C7F-A9F7-B2382137F407\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.170\",\"matchCriteriaId\":\"671B1493-DB61-421B-B0A9-893B3A862EB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.92\",\"matchCriteriaId\":\"2F6DB7A0-9052-479E-894D-15F862F4D3BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.10\",\"matchCriteriaId\":\"AAA1C6A6-3B03-4EC3-935C-C9FA0B50DB70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"18B1C9CE-F7E4-426B-A770-79F86AB5CC38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A70E596-2EF7-4651-B2EF-2CEE31DB6893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"18C82C96-2853-4DFE-93AD-F6E59B4129CA\"}]}]}],\"references\":[{\"url\":\"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://infosec.exchange/%40_mattata/109427999461122360\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20230420-0001/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://infosec.exchange/%40_mattata/109427999461122360\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20230420-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
suse-su-2023:1801-1
Vulnerability from csaf_suse
Published
2023-04-10 08:26
Modified
2023-04-10 08:26
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).
- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).
- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).
- CVE-2022-20567: Fixed use after free that could lead to a local privilege escalation in pppol2tp_create of l2tp_ppp.c (bsc#1208850).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).
- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).
- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).
- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).
- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).
The following non-security bugs were fixed:
- ARM: 8702/1: head-common.S: Clear lr before jumping to start_kernel() (git-fixes)
- Bluetooth: btusb: Add VID:PID 13d3:3529 for Realtek RTL8821CE (git-fixes).
- Bluetooth: btusb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- Input: atmel_mxt_ts - fix double free in mxt_read_info_block (git-fixes).
- KVM: arm64: Hide system instruction access to Trace registers (git-fixes)
- NFSv4: Fix hangs when recovering open state after a server reboot (git-fixes).
- PCI/MSI: Enforce MSI entry updates to be visible (git-fixes).
- PCI/MSI: Enforce that MSI-X table entry is masked for update (git-fixes).
- PCI/MSI: Mask all unused MSI-X entries (git-fixes).
- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).
- PCI/PM: Always return devices to D0 when thawing (git-fixes).
- PCI/PM: Avoid using device_may_wakeup() for runtime PM (git-fixes).
- PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints (git-fixes).
- PCI: Add ACS quirk for iProc PAXB (git-fixes).
- PCI: Avoid FLR for AMD Matisse HD Audio & USB 3.0 (git-fixes).
- PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).
- PCI: Make ACS quirk implementations more uniform (git-fixes).
- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).
- PCI: PM: Avoid skipping bus-level PM on platforms without ACPI (git-fixes).
- PCI: Unify ACS quirk desired vs provided checking (git-fixes).
- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).
- PCI: aardvark: Do not blindly enable ASPM L0s and do not write to read-only register (git-fixes).
- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).
- PCI: aardvark: Do not touch PCIe registers if no card connected (git-fixes).
- PCI: aardvark: Fix a leaked reference by adding missing of_node_put() (git-fixes).
- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).
- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).
- PCI: aardvark: Improve link training (git-fixes).
- PCI: aardvark: Indicate error in 'val' when config read fails (git-fixes).
- PCI: aardvark: Introduce an advk_pcie_valid_device() helper (git-fixes).
- PCI: aardvark: Remove PCIe outbound window configuration (git-fixes).
- PCI: aardvark: Train link immediately after enabling training (git-fixes).
- PCI: aardvark: Wait for endpoint to be ready before training link (git-fixes).
- PCI: endpoint: Cast the page number to phys_addr_t (git-fixes).
- PCI: endpoint: Fix for concurrent memory allocation in OB address region (git-fixes).
- PCI: hv: Add a per-bus mutex state_lock (bsc#1207001).
- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207001).
- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207001).
- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1207001).
- PCI: qcom: Use PHY_REFCLK_USE_PAD only for ipq8064 (git-fixes).
- PCI: tegra: Fix OF node reference leak (git-fixes).
- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).
- PM: hibernate: flush swap writer after marking (git-fixes).
- README.BRANCH: Adding myself to the maintainer list
- Revert 'PCI: hv: Fix a timing issue which causes kdump to fail occasionally' (bsc#1207001).
- Revert 'arm64: dts: juno: add dma-ranges property' (git-fixes)
- Revert 'mei: me: enable asynchronous probing' (bsc#1208048, bsc#1209126).
- SUNRPC: Fix a server shutdown leak (git-fixes).
- applicom: Fix PCI device refcount leak in applicom_init() (git-fixes).
- arm64/alternatives: do not patch up internal branches (git-fixes)
- arm64/alternatives: move length validation inside the subsection (git-fixes)
- arm64/alternatives: use subsections for replacement sequences (git-fixes)
- arm64/cpufeature: Fix field sign for DIT hwcap detection (git-fixes)
- arm64/mm: fix variable 'pud' set but not used (git-fixes)
- arm64/mm: return cpu_all_mask when node is NUMA_NO_NODE (git-fixes)
- arm64/vdso: Discard .note.gnu.property sections in vDSO (git-fixes)
- arm64: Discard .note.GNU-stack section (bsc#1203693 bsc#1209798).
- arm64: Do not forget syscall when starting a new thread. (git-fixes)
- arm64: Fix compiler warning from pte_unmap() with (git-fixes)
- arm64: Mark __stack_chk_guard as __ro_after_init (git-fixes)
- arm64: Use test_tsk_thread_flag() for checking TIF_SINGLESTEP (git-fixes)
- arm64: cmpxchg_double*: hazard against entire exchange variable (git-fixes)
- arm64: cpu_ops: fix a leaked reference by adding missing of_node_put (git-fixes)
- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes)
- arm64: kaslr: Reserve size of ARM64_MEMSTART_ALIGN in linear region (git-fixes)
- arm64: kprobe: make page to RO mode when allocate it (git-fixes)
- arm64: kpti: ensure patched kernel text is fetched from PoU (git-fixes)
- arm64: psci: Avoid printing in cpu_psci_cpu_die() (git-fixes)
- arm64: psci: Reduce the waiting time for cpu_psci_cpu_kill() (git-fixes)
- arm64: unwind: Prohibit probing on return_address() (git-fixes)
- crypto: arm64 - Fix unused variable compilation warnings of (git-fixes)
- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).
- ftrace: Fix invalid address access in lookup_rec() when index is 0 (git-fixes).
- ima: Fix function name error in comment (git-fixes).
- ipv4: route: fix inet_rtm_getroute induced crash (git-fixes).
- kabi: PCI: endpoint: Fix for concurrent memory allocation in OB address region (git-fixes).
- kfifo: fix ternary sign extension bugs (git-fixes).
- kgdb: Drop malformed kernel doc comment (git-fixes).
- net: usb: lan78xx: Limit packet length to skb->len (git-fixes).
- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).
- net: usb: smsc75xx: Limit packet length to skb->len (git-fixes).
- net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull (git-fixes).
- net: usb: smsc95xx: Limit packet length to skb->len (git-fixes).
- powerpc/btext: add missing of_node_put (bsc#1065729).
- powerpc/powernv/ioda: Skip unallocated resources when mapping to PE (bsc#1065729).
- powerpc/pseries/lpar: add missing RTAS retry status handling (bsc#1109158 ltc#169177 git-fixes).
- powerpc/pseries/lparcfg: add missing RTAS retry status handling (bsc#1065729).
- powerpc/rtas: ensure 4KB alignment for rtas_data_buf (bsc#1065729).
- powerpc/xics: fix refcount leak in icp_opal_init() (bsc#1065729).
- ppc64le: HWPOISON_INJECT=m (bsc#1209572).
- ring-buffer: remove obsolete comment for free_buffer_page() (git-fixes).
- s390/vfio-ap: fix memory leak in vfio_ap device driver (git-fixes).
- sbitmap: Avoid lockups when waker gets preempted (bsc#1209118).
- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1199837).
- scsi: qla2xxx: Synchronize the IOCB count to be in order (bsc#1209292 bsc#1209684 bsc#1209556).
- timers/sched_clock: Prevent generic sched_clock wrap caused by tick_freeze() (git-fixes).
- timers: Clear timer_base::must_forward_clk with (bsc#1207890)
- tracing/hwlat: Replace sched_setaffinity with set_cpus_allowed_ptr (git-fixes).
- tracing: Add NULL checks for buffer in ring_buffer_free_read_page() (git-fixes).
- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).
- usb: dwc3: exynos: Fix remove() function (git-fixes).
- usb: dwc3: gadget: Stop processing more requests on IMI (git-fixes).
- usb: misc: iowarrior: fix up header size for USB_DEVICE_ID_CODEMERCS_IOW100 (git-fixes).
- usb: typec: altmodes/displayport: Fix probe pin assign check (git-fixes).
- x86/PCI: Fix PCI IRQ routing table memory leak (git-fixes).
- x86/apic: Add name to irq chip (bsc#1206010).
- x86/apic: Deinline x2apic functions (bsc#1181001 jsc#ECO-3191).
- x86/atomic: Fix smp_mb__{before,after}_atomic() (git-fixes).
- x86/build: Add 'set -e' to mkcapflags.sh to delete broken capflags.c (git-fixes).
- x86/ia32: Fix ia32_restore_sigcontext() AC leak (git-fixes).
- x86/ioapic: Force affinity setup before startup (bsc#1193231).
- x86/irq/64: Limit IST stack overflow check to #DB stack (git-fixes).
- x86/mm: Remove in_nmi() warning from 64-bit implementation of vmalloc_fault() (git-fixes).
- x86/paravirt: Fix callee-saved function ELF sizes (git-fixes).
- x86/power: Fix 'nosmt' vs hibernation triple fault during resume (git-fixes).
- x86/stacktrace: Prevent infinite loop in arch_stack_walk_user() (git-fixes).
- x86/uaccess, signal: Fix AC=1 bloat (git-fixes).
- x86/x2apic: Mark set_x2apic_phys_mode() as __init (bsc#1181001 jsc#ECO-3191).
- x86/xen: Fix memory leak in xen_init_lock_cpu() (git-fixes).
- x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() (git-fixes).
- xen-netfront: Fix NULL sring after live migration (git-fixes).
- xen-netfront: Fix mismatched rtnl_unlock (git-fixes).
- xen-netfront: Fix race between device setup and open (git-fixes).
- xen-netfront: Update features after registering netdev (git-fixes).
- xen-netfront: enable device after manual module load (git-fixes).
- xen-netfront: fix potential deadlock in xennet_remove() (git-fixes).
- xen-netfront: wait xenbus state change when load module manually (git-fixes).
- xen/netfront: fix waiting for xenbus state change (git-fixes).
- xen/netfront: stop tx queues during live migration (git-fixes).
- xen/platform-pci: add missing free_irq() in error path (git-fixes).
Patchnames
SUSE-2023-1801,SUSE-SLE-SERVER-12-SP5-2023-1801
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).\n- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).\n- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).\n- CVE-2022-20567: Fixed use after free that could lead to a local privilege escalation in pppol2tp_create of l2tp_ppp.c (bsc#1208850).\n- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).\n- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).\n- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).\n- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).\n- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).\n- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).\n- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).\n- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).\n- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).\n\nThe following non-security bugs were fixed:\n\n- ARM: 8702/1: head-common.S: Clear lr before jumping to start_kernel() (git-fixes)\n- Bluetooth: btusb: Add VID:PID 13d3:3529 for Realtek RTL8821CE (git-fixes).\n- Bluetooth: btusb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- Input: atmel_mxt_ts - fix double free in mxt_read_info_block (git-fixes).\n- KVM: arm64: Hide system instruction access to Trace registers (git-fixes)\n- NFSv4: Fix hangs when recovering open state after a server reboot (git-fixes).\n- PCI/MSI: Enforce MSI entry updates to be visible (git-fixes).\n- PCI/MSI: Enforce that MSI-X table entry is masked for update (git-fixes).\n- PCI/MSI: Mask all unused MSI-X entries (git-fixes).\n- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).\n- PCI/PM: Always return devices to D0 when thawing (git-fixes).\n- PCI/PM: Avoid using device_may_wakeup() for runtime PM (git-fixes).\n- PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints (git-fixes).\n- PCI: Add ACS quirk for iProc PAXB (git-fixes).\n- PCI: Avoid FLR for AMD Matisse HD Audio \u0026 USB 3.0 (git-fixes).\n- PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).\n- PCI: Make ACS quirk implementations more uniform (git-fixes).\n- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).\n- PCI: PM: Avoid skipping bus-level PM on platforms without ACPI (git-fixes).\n- PCI: Unify ACS quirk desired vs provided checking (git-fixes).\n- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).\n- PCI: aardvark: Do not blindly enable ASPM L0s and do not write to read-only register (git-fixes).\n- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).\n- PCI: aardvark: Do not touch PCIe registers if no card connected (git-fixes).\n- PCI: aardvark: Fix a leaked reference by adding missing of_node_put() (git-fixes).\n- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).\n- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).\n- PCI: aardvark: Improve link training (git-fixes).\n- PCI: aardvark: Indicate error in \u0027val\u0027 when config read fails (git-fixes).\n- PCI: aardvark: Introduce an advk_pcie_valid_device() helper (git-fixes).\n- PCI: aardvark: Remove PCIe outbound window configuration (git-fixes).\n- PCI: aardvark: Train link immediately after enabling training (git-fixes).\n- PCI: aardvark: Wait for endpoint to be ready before training link (git-fixes).\n- PCI: endpoint: Cast the page number to phys_addr_t (git-fixes).\n- PCI: endpoint: Fix for concurrent memory allocation in OB address region (git-fixes).\n- PCI: hv: Add a per-bus mutex state_lock (bsc#1207001).\n- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207001).\n- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207001).\n- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1207001).\n- PCI: qcom: Use PHY_REFCLK_USE_PAD only for ipq8064 (git-fixes).\n- PCI: tegra: Fix OF node reference leak (git-fixes).\n- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).\n- PM: hibernate: flush swap writer after marking (git-fixes).\n- README.BRANCH: Adding myself to the maintainer list\n- Revert \u0027PCI: hv: Fix a timing issue which causes kdump to fail occasionally\u0027 (bsc#1207001).\n- Revert \u0027arm64: dts: juno: add dma-ranges property\u0027 (git-fixes)\n- Revert \u0027mei: me: enable asynchronous probing\u0027 (bsc#1208048, bsc#1209126).\n- SUNRPC: Fix a server shutdown leak (git-fixes).\n- applicom: Fix PCI device refcount leak in applicom_init() (git-fixes).\n- arm64/alternatives: do not patch up internal branches (git-fixes)\n- arm64/alternatives: move length validation inside the subsection (git-fixes)\n- arm64/alternatives: use subsections for replacement sequences (git-fixes)\n- arm64/cpufeature: Fix field sign for DIT hwcap detection (git-fixes)\n- arm64/mm: fix variable \u0027pud\u0027 set but not used (git-fixes)\n- arm64/mm: return cpu_all_mask when node is NUMA_NO_NODE (git-fixes)\n- arm64/vdso: Discard .note.gnu.property sections in vDSO (git-fixes)\n- arm64: Discard .note.GNU-stack section (bsc#1203693 bsc#1209798).\n- arm64: Do not forget syscall when starting a new thread. (git-fixes)\n- arm64: Fix compiler warning from pte_unmap() with (git-fixes)\n- arm64: Mark __stack_chk_guard as __ro_after_init (git-fixes)\n- arm64: Use test_tsk_thread_flag() for checking TIF_SINGLESTEP (git-fixes)\n- arm64: cmpxchg_double*: hazard against entire exchange variable (git-fixes)\n- arm64: cpu_ops: fix a leaked reference by adding missing of_node_put (git-fixes)\n- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes)\n- arm64: kaslr: Reserve size of ARM64_MEMSTART_ALIGN in linear region (git-fixes)\n- arm64: kprobe: make page to RO mode when allocate it (git-fixes)\n- arm64: kpti: ensure patched kernel text is fetched from PoU (git-fixes)\n- arm64: psci: Avoid printing in cpu_psci_cpu_die() (git-fixes)\n- arm64: psci: Reduce the waiting time for cpu_psci_cpu_kill() (git-fixes)\n- arm64: unwind: Prohibit probing on return_address() (git-fixes)\n- crypto: arm64 - Fix unused variable compilation warnings of (git-fixes)\n- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).\n- ftrace: Fix invalid address access in lookup_rec() when index is 0 (git-fixes).\n- ima: Fix function name error in comment (git-fixes).\n- ipv4: route: fix inet_rtm_getroute induced crash (git-fixes).\n- kabi: PCI: endpoint: Fix for concurrent memory allocation in OB address region (git-fixes).\n- kfifo: fix ternary sign extension bugs (git-fixes).\n- kgdb: Drop malformed kernel doc comment (git-fixes).\n- net: usb: lan78xx: Limit packet length to skb-\u003elen (git-fixes).\n- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).\n- net: usb: smsc75xx: Limit packet length to skb-\u003elen (git-fixes).\n- net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull (git-fixes).\n- net: usb: smsc95xx: Limit packet length to skb-\u003elen (git-fixes).\n- powerpc/btext: add missing of_node_put (bsc#1065729).\n- powerpc/powernv/ioda: Skip unallocated resources when mapping to PE (bsc#1065729).\n- powerpc/pseries/lpar: add missing RTAS retry status handling (bsc#1109158 ltc#169177 git-fixes).\n- powerpc/pseries/lparcfg: add missing RTAS retry status handling (bsc#1065729).\n- powerpc/rtas: ensure 4KB alignment for rtas_data_buf (bsc#1065729).\n- powerpc/xics: fix refcount leak in icp_opal_init() (bsc#1065729).\n- ppc64le: HWPOISON_INJECT=m (bsc#1209572).\n- ring-buffer: remove obsolete comment for free_buffer_page() (git-fixes).\n- s390/vfio-ap: fix memory leak in vfio_ap device driver (git-fixes).\n- sbitmap: Avoid lockups when waker gets preempted (bsc#1209118).\n- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1199837).\n- scsi: qla2xxx: Synchronize the IOCB count to be in order (bsc#1209292 bsc#1209684 bsc#1209556).\n- timers/sched_clock: Prevent generic sched_clock wrap caused by tick_freeze() (git-fixes).\n- timers: Clear timer_base::must_forward_clk with (bsc#1207890)\n- tracing/hwlat: Replace sched_setaffinity with set_cpus_allowed_ptr (git-fixes).\n- tracing: Add NULL checks for buffer in ring_buffer_free_read_page() (git-fixes).\n- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).\n- usb: dwc3: exynos: Fix remove() function (git-fixes).\n- usb: dwc3: gadget: Stop processing more requests on IMI (git-fixes).\n- usb: misc: iowarrior: fix up header size for USB_DEVICE_ID_CODEMERCS_IOW100 (git-fixes).\n- usb: typec: altmodes/displayport: Fix probe pin assign check (git-fixes).\n- x86/PCI: Fix PCI IRQ routing table memory leak (git-fixes).\n- x86/apic: Add name to irq chip (bsc#1206010).\n- x86/apic: Deinline x2apic functions (bsc#1181001 jsc#ECO-3191).\n- x86/atomic: Fix smp_mb__{before,after}_atomic() (git-fixes).\n- x86/build: Add \u0027set -e\u0027 to mkcapflags.sh to delete broken capflags.c (git-fixes).\n- x86/ia32: Fix ia32_restore_sigcontext() AC leak (git-fixes).\n- x86/ioapic: Force affinity setup before startup (bsc#1193231).\n- x86/irq/64: Limit IST stack overflow check to #DB stack (git-fixes).\n- x86/mm: Remove in_nmi() warning from 64-bit implementation of vmalloc_fault() (git-fixes).\n- x86/paravirt: Fix callee-saved function ELF sizes (git-fixes).\n- x86/power: Fix \u0027nosmt\u0027 vs hibernation triple fault during resume (git-fixes).\n- x86/stacktrace: Prevent infinite loop in arch_stack_walk_user() (git-fixes).\n- x86/uaccess, signal: Fix AC=1 bloat (git-fixes).\n- x86/x2apic: Mark set_x2apic_phys_mode() as __init (bsc#1181001 jsc#ECO-3191).\n- x86/xen: Fix memory leak in xen_init_lock_cpu() (git-fixes).\n- x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() (git-fixes).\n- xen-netfront: Fix NULL sring after live migration (git-fixes).\n- xen-netfront: Fix mismatched rtnl_unlock (git-fixes).\n- xen-netfront: Fix race between device setup and open (git-fixes).\n- xen-netfront: Update features after registering netdev (git-fixes).\n- xen-netfront: enable device after manual module load (git-fixes).\n- xen-netfront: fix potential deadlock in xennet_remove() (git-fixes).\n- xen-netfront: wait xenbus state change when load module manually (git-fixes).\n- xen/netfront: fix waiting for xenbus state change (git-fixes).\n- xen/netfront: stop tx queues during live migration (git-fixes).\n- xen/platform-pci: add missing free_irq() in error path (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-1801,SUSE-SLE-SERVER-12-SP5-2023-1801", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_1801-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:1801-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20231801-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:1801-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1076830", "url": "https://bugzilla.suse.com/1076830" }, { "category": "self", "summary": "SUSE Bug 1109158", "url": "https://bugzilla.suse.com/1109158" }, { "category": "self", "summary": "SUSE Bug 1181001", "url": "https://bugzilla.suse.com/1181001" }, { "category": "self", "summary": "SUSE Bug 1193231", "url": "https://bugzilla.suse.com/1193231" }, { "category": "self", "summary": "SUSE Bug 1199837", "url": "https://bugzilla.suse.com/1199837" }, { "category": "self", "summary": "SUSE Bug 1203693", "url": "https://bugzilla.suse.com/1203693" }, { "category": "self", "summary": "SUSE Bug 1206010", "url": "https://bugzilla.suse.com/1206010" }, { "category": "self", "summary": "SUSE Bug 1207001", "url": "https://bugzilla.suse.com/1207001" }, { "category": "self", "summary": "SUSE Bug 1207036", "url": "https://bugzilla.suse.com/1207036" }, { "category": "self", "summary": "SUSE Bug 1207125", "url": "https://bugzilla.suse.com/1207125" }, { "category": "self", "summary": "SUSE Bug 1207795", "url": "https://bugzilla.suse.com/1207795" }, { "category": "self", "summary": "SUSE Bug 1207890", "url": "https://bugzilla.suse.com/1207890" }, { "category": "self", "summary": "SUSE Bug 1208048", "url": "https://bugzilla.suse.com/1208048" }, { "category": "self", "summary": "SUSE Bug 1208599", "url": "https://bugzilla.suse.com/1208599" }, { "category": "self", "summary": "SUSE Bug 1208777", "url": "https://bugzilla.suse.com/1208777" }, { "category": "self", "summary": "SUSE Bug 1208850", "url": "https://bugzilla.suse.com/1208850" }, { "category": "self", "summary": "SUSE Bug 1209052", "url": "https://bugzilla.suse.com/1209052" }, { "category": "self", "summary": "SUSE Bug 1209118", "url": "https://bugzilla.suse.com/1209118" }, { "category": "self", "summary": "SUSE Bug 1209126", "url": "https://bugzilla.suse.com/1209126" }, { "category": "self", "summary": "SUSE Bug 1209256", "url": "https://bugzilla.suse.com/1209256" }, { "category": "self", "summary": "SUSE Bug 1209289", "url": "https://bugzilla.suse.com/1209289" }, { "category": "self", "summary": "SUSE Bug 1209291", "url": "https://bugzilla.suse.com/1209291" }, { "category": "self", "summary": "SUSE Bug 1209292", "url": "https://bugzilla.suse.com/1209292" }, { "category": "self", "summary": "SUSE Bug 1209532", "url": "https://bugzilla.suse.com/1209532" }, { "category": "self", "summary": "SUSE Bug 1209547", "url": "https://bugzilla.suse.com/1209547" }, { "category": "self", "summary": "SUSE Bug 1209549", "url": "https://bugzilla.suse.com/1209549" }, { "category": "self", "summary": "SUSE Bug 1209556", "url": "https://bugzilla.suse.com/1209556" }, { "category": "self", "summary": "SUSE Bug 1209572", "url": "https://bugzilla.suse.com/1209572" }, { "category": "self", "summary": "SUSE Bug 1209634", "url": "https://bugzilla.suse.com/1209634" }, { "category": "self", "summary": "SUSE Bug 1209684", "url": "https://bugzilla.suse.com/1209684" }, { "category": "self", "summary": "SUSE Bug 1209778", "url": "https://bugzilla.suse.com/1209778" }, { "category": "self", "summary": "SUSE Bug 1209798", "url": "https://bugzilla.suse.com/1209798" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3923 page", "url": "https://www.suse.com/security/cve/CVE-2021-3923/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20567 page", "url": "https://www.suse.com/security/cve/CVE-2022-20567/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0590 page", "url": "https://www.suse.com/security/cve/CVE-2023-0590/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1076 page", "url": "https://www.suse.com/security/cve/CVE-2023-1076/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1095 page", "url": "https://www.suse.com/security/cve/CVE-2023-1095/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1281 page", "url": "https://www.suse.com/security/cve/CVE-2023-1281/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1513 page", "url": "https://www.suse.com/security/cve/CVE-2023-1513/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23454 page", "url": "https://www.suse.com/security/cve/CVE-2023-23454/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28328 page", "url": "https://www.suse.com/security/cve/CVE-2023-28328/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28464 page", "url": "https://www.suse.com/security/cve/CVE-2023-28464/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28772 page", "url": "https://www.suse.com/security/cve/CVE-2023-28772/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2023-04-10T08:26:05Z", "generator": { "date": "2023-04-10T08:26:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:1801-1", "initial_release_date": "2023-04-10T08:26:05Z", "revision_history": [ { "date": "2023-04-10T08:26:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-16.130.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-16.130.1.noarch", "product_id": "kernel-devel-azure-4.12.14-16.130.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-16.130.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-16.130.1.noarch", "product_id": "kernel-source-azure-4.12.14-16.130.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-16.130.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-16.130.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-16.130.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-16.130.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-16.130.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-16.130.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-16.130.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-16.130.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-16.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-16.130.1.x86_64", "product": { "name": "kernel-azure-4.12.14-16.130.1.x86_64", "product_id": "kernel-azure-4.12.14-16.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-16.130.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-16.130.1.x86_64", "product_id": "kernel-azure-base-4.12.14-16.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-16.130.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-16.130.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-16.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-16.130.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-16.130.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-16.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-devel-4.12.14-16.130.1.x86_64", "product": { "name": "kernel-azure-kgraft-devel-4.12.14-16.130.1.x86_64", "product_id": "kernel-azure-kgraft-devel-4.12.14-16.130.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-16.130.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-16.130.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-16.130.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-16.130.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-16.130.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-16.130.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-16.130.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-16.130.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-16.130.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.130.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.130.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.130.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.130.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.130.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.130.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.130.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.130.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.130.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.130.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.130.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.130.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.130.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.130.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.130.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.130.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.130.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T08:26:05Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2021-3923", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3923" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3923", "url": "https://www.suse.com/security/cve/CVE-2021-3923" }, { "category": "external", "summary": "SUSE Bug 1209778 for CVE-2021-3923", "url": "https://bugzilla.suse.com/1209778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T08:26:05Z", "details": "low" } ], "title": "CVE-2021-3923" }, { "cve": "CVE-2022-20567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20567" } ], "notes": [ { "category": "general", "text": "In pppol2tp_create of l2tp_ppp.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-186777253References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20567", "url": "https://www.suse.com/security/cve/CVE-2022-20567" }, { "category": "external", "summary": "SUSE Bug 1208850 for CVE-2022-20567", "url": "https://bugzilla.suse.com/1208850" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T08:26:05Z", "details": "moderate" } ], "title": "CVE-2022-20567" }, { "cve": "CVE-2023-0590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0590" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0590", "url": "https://www.suse.com/security/cve/CVE-2023-0590" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207795 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207795" }, { "category": "external", "summary": "SUSE Bug 1207822 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207822" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1211495" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T08:26:05Z", "details": "important" } ], "title": "CVE-2023-0590" }, { "cve": "CVE-2023-1076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1076" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1076", "url": "https://www.suse.com/security/cve/CVE-2023-1076" }, { "category": "external", "summary": "SUSE Bug 1208599 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1208599" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T08:26:05Z", "details": "moderate" } ], "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1095" } ], "notes": [ { "category": "general", "text": "In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1095", "url": "https://www.suse.com/security/cve/CVE-2023-1095" }, { "category": "external", "summary": "SUSE Bug 1208777 for CVE-2023-1095", "url": "https://bugzilla.suse.com/1208777" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T08:26:05Z", "details": "moderate" } ], "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1281" } ], "notes": [ { "category": "general", "text": "Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when \u0027tcf_exts_exec()\u0027 is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root.\nThis issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1281", "url": "https://www.suse.com/security/cve/CVE-2023-1281" }, { "category": "external", "summary": "SUSE Bug 1209634 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1209634" }, { "category": "external", "summary": "SUSE Bug 1209683 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1209683" }, { "category": "external", "summary": "SUSE Bug 1210335 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1210335" }, { "category": "external", "summary": "SUSE Bug 1210423 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1210423" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T08:26:05Z", "details": "important" } ], "title": "CVE-2023-1281" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T08:26:05Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1513" } ], "notes": [ { "category": "general", "text": "A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1513", "url": "https://www.suse.com/security/cve/CVE-2023-1513" }, { "category": "external", "summary": "SUSE Bug 1209532 for CVE-2023-1513", "url": "https://bugzilla.suse.com/1209532" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T08:26:05Z", "details": "low" } ], "title": "CVE-2023-1513" }, { "cve": "CVE-2023-23454", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23454" } ], "notes": [ { "category": "general", "text": "cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23454", "url": "https://www.suse.com/security/cve/CVE-2023-23454" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207188 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1207188" }, { "category": "external", "summary": "SUSE Bug 1208030 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208030" }, { "category": "external", "summary": "SUSE Bug 1208044 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208044" }, { "category": "external", "summary": "SUSE Bug 1208085 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208085" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T08:26:05Z", "details": "important" } ], "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T08:26:05Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-28328", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28328" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28328", "url": "https://www.suse.com/security/cve/CVE-2023-28328" }, { "category": "external", "summary": "SUSE Bug 1209291 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1209291" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T08:26:05Z", "details": "moderate" } ], "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28464" } ], "notes": [ { "category": "general", "text": "hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28464", "url": "https://www.suse.com/security/cve/CVE-2023-28464" }, { "category": "external", "summary": "SUSE Bug 1209052 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1209052" }, { "category": "external", "summary": "SUSE Bug 1211111 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1211111" }, { "category": "external", "summary": "SUSE Bug 1220130 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1220130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T08:26:05Z", "details": "important" } ], "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28772", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28772" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28772", "url": "https://www.suse.com/security/cve/CVE-2023-28772" }, { "category": "external", "summary": "SUSE Bug 1209549 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1209549" }, { "category": "external", "summary": "SUSE Bug 1211110 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1211110" }, { "category": "external", "summary": "SUSE Bug 1214378 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1214378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.130.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.130.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.130.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T08:26:05Z", "details": "important" } ], "title": "CVE-2023-28772" } ] }
suse-su-2023:2690-1
Vulnerability from csaf_suse
Published
2023-06-28 15:06
Modified
2023-06-28 15:06
Summary
Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP4)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP4)
Description of the patch
This update for the Linux Kernel 4.12.14-95_117 fixes several issues.
The following security issues were fixed:
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
Patchnames
SUSE-2023-2690,SUSE-SLE-Live-Patching-12-SP4-2023-2690
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP4)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-95_117 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2690,SUSE-SLE-Live-Patching-12-SP4-2023-2690", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2690-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2690-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232690-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2690-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015353.html" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP4)", "tracking": { "current_release_date": "2023-06-28T15:06:38Z", "generator": { "date": "2023-06-28T15:06:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2690-1", "initial_release_date": "2023-06-28T15:06:38Z", "revision_history": [ { "date": "2023-06-28T15:06:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_117-default-5-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_117-default-5-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_117-default-5-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_117-default-5-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-95_117-default-5-2.2.s390x", "product_id": "kgraft-patch-4_12_14-95_117-default-5-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_117-default-5-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_117-default-5-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_117-default-5-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_117-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_117-default-5-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_117-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_117-default-5-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_117-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_117-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T15:06:38Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_117-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T15:06:38Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:1811-1
Vulnerability from csaf_suse
Published
2023-07-06 09:33
Modified
2023-07-06 09:33
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).
- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).
- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).
- CVE-2023-0394: Fixed a null pointer dereference flaw in the network subcomponent in the Linux kernel which could lead to system crash (bsc#1207168).
- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).
- CVE-2023-1075: Fixed a type confusion in tls_is_tx_ready (bsc#1208598).
- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).
- CVE-2023-1078: Fixed a heap out-of-bounds write in rds_rm_zerocopy_callback (bsc#1208601).
- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).
- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).
- CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-1582: Fixed soft lockup in __page_mapcount (bsc#1209636).
- CVE-2023-23004: Fixed misinterpretation of get_sg_table return value (bsc#1208843).
- CVE-2023-25012: Fixed a use-after-free in bigben_set_led() (bsc#1207560).
- CVE-2023-28327: Fixed DoS in in_skb in unix_diag_get_exact() (bsc#1209290).
- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1209366).
- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).
The following non-security bugs were fixed:
- Do not sign the vanilla kernel (bsc#1209008).
- PCI: hv: Add a per-bus mutex state_lock (bsc#1209785).
- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1209785).
- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1209785).
- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1209785).
- Revert 'PCI: hv: Fix a timing issue which causes kdump to fail occasionally' (bsc#1209785).
- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).
- kernel-module-subpackage: Fix expansion with -b parameter (bsc#1208179).
- net: ena: optimize data access in fast-path code (bsc#1208137).
Patchnames
SUSE-2023-1811,SUSE-SLE-Module-Live-Patching-15-SP3-2023-1811,SUSE-SLE-Product-HA-15-SP3-2023-1811,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1811,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1811,SUSE-SLE-Product-RT-15-SP3-2023-1811,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1811,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1811,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1811,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1811,SUSE-SUSE-MicroOS-5.1-2023-1811,SUSE-SUSE-MicroOS-5.2-2023-1811,SUSE-Storage-7.1-2023-1811,openSUSE-SLE-15.4-2023-1811
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).\n- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).\n- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).\n- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).\n- CVE-2023-0394: Fixed a null pointer dereference flaw in the network subcomponent in the Linux kernel which could lead to system crash (bsc#1207168).\n- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).\n- CVE-2023-1075: Fixed a type confusion in tls_is_tx_ready (bsc#1208598).\n- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).\n- CVE-2023-1078: Fixed a heap out-of-bounds write in rds_rm_zerocopy_callback (bsc#1208601).\n- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).\n- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).\n- CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).\n- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).\n- CVE-2023-1582: Fixed soft lockup in __page_mapcount (bsc#1209636).\n- CVE-2023-23004: Fixed misinterpretation of get_sg_table return value (bsc#1208843).\n- CVE-2023-25012: Fixed a use-after-free in bigben_set_led() (bsc#1207560).\n- CVE-2023-28327: Fixed DoS in in_skb in unix_diag_get_exact() (bsc#1209290).\n- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).\n- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1209366).\n- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).\n\nThe following non-security bugs were fixed:\n\n- Do not sign the vanilla kernel (bsc#1209008).\n- PCI: hv: Add a per-bus mutex state_lock (bsc#1209785).\n- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1209785).\n- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1209785).\n- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1209785).\n- Revert \u0027PCI: hv: Fix a timing issue which causes kdump to fail occasionally\u0027 (bsc#1209785).\n- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).\n- kernel-module-subpackage: Fix expansion with -b parameter (bsc#1208179).\n- net: ena: optimize data access in fast-path code (bsc#1208137).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-1811,SUSE-SLE-Module-Live-Patching-15-SP3-2023-1811,SUSE-SLE-Product-HA-15-SP3-2023-1811,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1811,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1811,SUSE-SLE-Product-RT-15-SP3-2023-1811,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1811,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1811,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-1811,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-1811,SUSE-SUSE-MicroOS-5.1-2023-1811,SUSE-SUSE-MicroOS-5.2-2023-1811,SUSE-Storage-7.1-2023-1811,openSUSE-SLE-15.4-2023-1811", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_1811-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:1811-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20231811-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:1811-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" }, { "category": "self", "summary": "SUSE Bug 1207168", "url": "https://bugzilla.suse.com/1207168" }, { "category": "self", "summary": "SUSE Bug 1207560", "url": "https://bugzilla.suse.com/1207560" }, { "category": "self", "summary": "SUSE Bug 1208137", "url": "https://bugzilla.suse.com/1208137" }, { "category": "self", "summary": "SUSE Bug 1208179", "url": "https://bugzilla.suse.com/1208179" }, { "category": "self", "summary": "SUSE Bug 1208598", "url": "https://bugzilla.suse.com/1208598" }, { "category": "self", "summary": "SUSE Bug 1208599", "url": "https://bugzilla.suse.com/1208599" }, { "category": "self", "summary": "SUSE Bug 1208601", "url": "https://bugzilla.suse.com/1208601" }, { "category": "self", "summary": "SUSE Bug 1208777", "url": "https://bugzilla.suse.com/1208777" }, { "category": "self", "summary": "SUSE Bug 1208787", "url": "https://bugzilla.suse.com/1208787" }, { "category": "self", "summary": "SUSE Bug 1208843", "url": "https://bugzilla.suse.com/1208843" }, { "category": "self", "summary": "SUSE Bug 1209008", "url": "https://bugzilla.suse.com/1209008" }, { "category": "self", "summary": "SUSE Bug 1209052", "url": "https://bugzilla.suse.com/1209052" }, { "category": "self", "summary": "SUSE Bug 1209256", "url": "https://bugzilla.suse.com/1209256" }, { "category": "self", "summary": "SUSE Bug 1209288", "url": "https://bugzilla.suse.com/1209288" }, { "category": "self", "summary": "SUSE Bug 1209289", "url": "https://bugzilla.suse.com/1209289" }, { "category": "self", "summary": "SUSE Bug 1209290", "url": "https://bugzilla.suse.com/1209290" }, { "category": "self", "summary": "SUSE Bug 1209291", "url": "https://bugzilla.suse.com/1209291" }, { "category": "self", "summary": "SUSE Bug 1209366", "url": "https://bugzilla.suse.com/1209366" }, { "category": "self", "summary": "SUSE Bug 1209532", "url": "https://bugzilla.suse.com/1209532" }, { "category": "self", "summary": "SUSE Bug 1209547", "url": "https://bugzilla.suse.com/1209547" }, { "category": "self", "summary": "SUSE Bug 1209549", "url": "https://bugzilla.suse.com/1209549" }, { "category": "self", "summary": "SUSE Bug 1209634", "url": "https://bugzilla.suse.com/1209634" }, { "category": "self", "summary": "SUSE Bug 1209635", "url": "https://bugzilla.suse.com/1209635" }, { "category": "self", "summary": "SUSE Bug 1209636", "url": "https://bugzilla.suse.com/1209636" }, { "category": "self", "summary": "SUSE Bug 1209672", "url": "https://bugzilla.suse.com/1209672" }, { "category": "self", "summary": "SUSE Bug 1209683", "url": "https://bugzilla.suse.com/1209683" }, { "category": "self", "summary": "SUSE Bug 1209778", "url": "https://bugzilla.suse.com/1209778" }, { "category": "self", "summary": "SUSE Bug 1209785", "url": "https://bugzilla.suse.com/1209785" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3923 page", "url": "https://www.suse.com/security/cve/CVE-2021-3923/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4744 page", "url": "https://www.suse.com/security/cve/CVE-2022-4744/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0394 page", "url": "https://www.suse.com/security/cve/CVE-2023-0394/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0461 page", "url": "https://www.suse.com/security/cve/CVE-2023-0461/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1075 page", "url": "https://www.suse.com/security/cve/CVE-2023-1075/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1076 page", "url": "https://www.suse.com/security/cve/CVE-2023-1076/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1078 page", "url": "https://www.suse.com/security/cve/CVE-2023-1078/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1095 page", "url": "https://www.suse.com/security/cve/CVE-2023-1095/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1281 page", "url": "https://www.suse.com/security/cve/CVE-2023-1281/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1382 page", "url": "https://www.suse.com/security/cve/CVE-2023-1382/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1513 page", "url": "https://www.suse.com/security/cve/CVE-2023-1513/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1582 page", "url": "https://www.suse.com/security/cve/CVE-2023-1582/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23004 page", "url": "https://www.suse.com/security/cve/CVE-2023-23004/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-25012 page", "url": "https://www.suse.com/security/cve/CVE-2023-25012/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28327 page", "url": "https://www.suse.com/security/cve/CVE-2023-28327/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28328 page", "url": "https://www.suse.com/security/cve/CVE-2023-28328/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28464 page", "url": "https://www.suse.com/security/cve/CVE-2023-28464/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28772 page", "url": "https://www.suse.com/security/cve/CVE-2023-28772/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2023-07-06T09:33:47Z", "generator": { "date": "2023-07-06T09:33:47Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:1811-1", "initial_release_date": "2023-07-06T09:33:47Z", "revision_history": [ { "date": "2023-07-06T09:33:47Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-64kb-5.3.18-150300.59.118.1.aarch64", "product": { "name": "cluster-md-kmp-64kb-5.3.18-150300.59.118.1.aarch64", "product_id": "cluster-md-kmp-64kb-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-150300.59.118.1.aarch64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-150300.59.118.1.aarch64", "product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-64kb-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dlm-kmp-64kb-5.3.18-150300.59.118.1.aarch64", "product_id": "dlm-kmp-64kb-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "product_id": "dlm-kmp-default-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dlm-kmp-preempt-5.3.18-150300.59.118.1.aarch64", "product_id": "dlm-kmp-preempt-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-al-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-al-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-al-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-allwinner-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-allwinner-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-altera-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-altera-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-amd-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-amd-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-amlogic-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-amlogic-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-apm-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-apm-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-arm-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-arm-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-broadcom-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-broadcom-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-cavium-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-cavium-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-exynos-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-exynos-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-freescale-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-freescale-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-hisilicon-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-hisilicon-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-lg-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-lg-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-marvell-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-marvell-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-mediatek-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-mediatek-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-nvidia-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-nvidia-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-qcom-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-qcom-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-renesas-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-renesas-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-rockchip-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-rockchip-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-socionext-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-socionext-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-sprd-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-sprd-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-xilinx-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-xilinx-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-5.3.18-150300.59.118.1.aarch64", "product": { "name": "dtb-zte-5.3.18-150300.59.118.1.aarch64", "product_id": "dtb-zte-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-64kb-5.3.18-150300.59.118.1.aarch64", "product": { "name": "gfs2-kmp-64kb-5.3.18-150300.59.118.1.aarch64", "product_id": "gfs2-kmp-64kb-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "product_id": "gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-150300.59.118.1.aarch64", "product": { "name": "gfs2-kmp-preempt-5.3.18-150300.59.118.1.aarch64", "product_id": "gfs2-kmp-preempt-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-64kb-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-64kb-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-extra-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-64kb-extra-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-64kb-extra-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-64kb-livepatch-devel-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-optional-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-64kb-optional-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-64kb-optional-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-default-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-default-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "product": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "product_id": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.118.1.150300.18.68.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-default-devel-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-default-extra-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-default-extra-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-default-livepatch-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-default-optional-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-default-optional-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-obs-build-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-obs-qa-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-preempt-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-preempt-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-preempt-extra-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-preempt-extra-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-optional-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-preempt-optional-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-preempt-optional-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kernel-syms-5.3.18-150300.59.118.1.aarch64", "product_id": "kernel-syms-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-64kb-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kselftests-kmp-64kb-5.3.18-150300.59.118.1.aarch64", "product_id": "kselftests-kmp-64kb-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.118.1.aarch64", "product_id": "kselftests-kmp-default-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-150300.59.118.1.aarch64", "product": { "name": "kselftests-kmp-preempt-5.3.18-150300.59.118.1.aarch64", "product_id": "kselftests-kmp-preempt-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-64kb-5.3.18-150300.59.118.1.aarch64", "product": { "name": "ocfs2-kmp-64kb-5.3.18-150300.59.118.1.aarch64", "product_id": "ocfs2-kmp-64kb-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-150300.59.118.1.aarch64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-150300.59.118.1.aarch64", "product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-64kb-5.3.18-150300.59.118.1.aarch64", "product": { "name": "reiserfs-kmp-64kb-5.3.18-150300.59.118.1.aarch64", "product_id": "reiserfs-kmp-64kb-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-150300.59.118.1.aarch64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-150300.59.118.1.aarch64", "product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.118.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-150300.59.118.1.noarch", "product": { "name": "kernel-devel-5.3.18-150300.59.118.1.noarch", "product_id": "kernel-devel-5.3.18-150300.59.118.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-150300.59.118.1.noarch", "product": { "name": "kernel-docs-5.3.18-150300.59.118.1.noarch", "product_id": "kernel-docs-5.3.18-150300.59.118.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-150300.59.118.1.noarch", "product": { "name": "kernel-docs-html-5.3.18-150300.59.118.1.noarch", "product_id": "kernel-docs-html-5.3.18-150300.59.118.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-150300.59.118.1.noarch", "product": { "name": "kernel-macros-5.3.18-150300.59.118.1.noarch", "product_id": "kernel-macros-5.3.18-150300.59.118.1.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-150300.59.118.1.noarch", "product": { "name": "kernel-source-5.3.18-150300.59.118.1.noarch", "product_id": "kernel-source-5.3.18-150300.59.118.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-150300.59.118.1.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-150300.59.118.1.noarch", "product_id": "kernel-source-vanilla-5.3.18-150300.59.118.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "product_id": "dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "product_id": "gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "kernel-debug-5.3.18-150300.59.118.1.ppc64le", "product_id": "kernel-debug-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "kernel-debug-devel-5.3.18-150300.59.118.1.ppc64le", "product_id": "kernel-debug-devel-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "kernel-default-5.3.18-150300.59.118.1.ppc64le", "product_id": "kernel-default-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "product": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "product_id": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "product_id": "kernel-default-devel-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "kernel-default-extra-5.3.18-150300.59.118.1.ppc64le", "product_id": "kernel-default-extra-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "product_id": "kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "kernel-default-optional-5.3.18-150300.59.118.1.ppc64le", "product_id": "kernel-default-optional-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "kernel-kvmsmall-5.3.18-150300.59.118.1.ppc64le", "product_id": "kernel-kvmsmall-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.3.18-150300.59.118.1.ppc64le", "product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "product_id": "kernel-obs-build-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.118.1.ppc64le", "product_id": "kernel-obs-qa-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "kernel-syms-5.3.18-150300.59.118.1.ppc64le", "product_id": "kernel-syms-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.118.1.ppc64le", "product_id": "kselftests-kmp-default-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "product_id": "dlm-kmp-default-5.3.18-150300.59.118.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "product_id": "gfs2-kmp-default-5.3.18-150300.59.118.1.s390x" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.118.1.s390x", "product": { "name": "kernel-default-5.3.18-150300.59.118.1.s390x", "product_id": "kernel-default-5.3.18-150300.59.118.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "product": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "product_id": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.118.1.150300.18.68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.118.1.s390x", "product": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.s390x", "product_id": "kernel-default-devel-5.3.18-150300.59.118.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.118.1.s390x", "product": { "name": "kernel-default-extra-5.3.18-150300.59.118.1.s390x", "product_id": "kernel-default-extra-5.3.18-150300.59.118.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "product_id": "kernel-default-livepatch-5.3.18-150300.59.118.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.118.1.s390x", "product": { "name": "kernel-default-optional-5.3.18-150300.59.118.1.s390x", "product_id": "kernel-default-optional-5.3.18-150300.59.118.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.118.1.s390x", "product": { "name": "kernel-obs-build-5.3.18-150300.59.118.1.s390x", "product_id": "kernel-obs-build-5.3.18-150300.59.118.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.118.1.s390x", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.118.1.s390x", "product_id": "kernel-obs-qa-5.3.18-150300.59.118.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.118.1.s390x", "product": { "name": "kernel-syms-5.3.18-150300.59.118.1.s390x", "product_id": "kernel-syms-5.3.18-150300.59.118.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "product": { "name": "kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "product_id": "kernel-zfcpdump-5.3.18-150300.59.118.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.118.1.s390x", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.118.1.s390x", "product_id": "kselftests-kmp-default-5.3.18-150300.59.118.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-150300.59.118.1.x86_64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-150300.59.118.1.x86_64", "product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "product_id": "dlm-kmp-default-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-150300.59.118.1.x86_64", "product": { "name": "dlm-kmp-preempt-5.3.18-150300.59.118.1.x86_64", "product_id": "dlm-kmp-preempt-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "product_id": "gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-150300.59.118.1.x86_64", "product": { "name": "gfs2-kmp-preempt-5.3.18-150300.59.118.1.x86_64", "product_id": "gfs2-kmp-preempt-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-debug-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-debug-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-debug-devel-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-default-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-default-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "product": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "product_id": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.118.1.150300.18.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-default-extra-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-default-extra-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-default-optional-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-default-optional-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-kvmsmall-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_118-preempt-1-150300.7.3.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_118-preempt-1-150300.7.3.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_118-preempt-1-150300.7.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-obs-build-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-obs-qa-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-preempt-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-preempt-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-preempt-extra-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-preempt-extra-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-optional-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-preempt-optional-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-preempt-optional-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kernel-syms-5.3.18-150300.59.118.1.x86_64", "product_id": "kernel-syms-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.118.1.x86_64", "product_id": "kselftests-kmp-default-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-150300.59.118.1.x86_64", "product": { "name": "kselftests-kmp-preempt-5.3.18-150300.59.118.1.x86_64", "product_id": "kselftests-kmp-preempt-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-150300.59.118.1.x86_64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-150300.59.118.1.x86_64", "product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-150300.59.118.1.x86_64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-150300.59.118.1.x86_64", "product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.118.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 15 SP3", "product": { "name": "SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_rt:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.2", "product": { "name": "SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.2" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.2", "product": { "name": "SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.118.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.118.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.118.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-64kb-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-source-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-64kb-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-source-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-source-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Real Time 15 SP3", "product_id": "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-64kb-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.118.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.118.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-source-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.118.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.118.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x" }, "product_reference": "kernel-syms-5.3.18-150300.59.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-5.3.18-150300.59.118.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x" }, "product_reference": "kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.118.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150300.59.118.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-source-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.118.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64 as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64 as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150300.59.118.1.noarch as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150300.59.118.1.noarch as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.118.1.x86_64 as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.ppc64le as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.s390x as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64 as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.ppc64le as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.s390x as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.118.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64 as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150300.59.118.1.noarch as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150300.59.118.1.noarch as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.118.1.x86_64 as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-5.3.18-150300.59.118.1.s390x as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x" }, "product_reference": "kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.s390x as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.3.18-150300.59.118.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-64kb-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150300.59.118.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150300.59.118.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150300.59.118.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.118.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.118.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.118.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.118.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150300.59.118.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch" }, "product_reference": "kernel-source-5.3.18-150300.59.118.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.118.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.118.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-al-5.3.18-150300.59.118.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "dtb-al-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-zte-5.3.18-150300.59.118.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" }, "product_reference": "dtb-zte-5.3.18-150300.59.118.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2021-3923", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3923" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3923", "url": "https://www.suse.com/security/cve/CVE-2021-3923" }, { "category": "external", "summary": "SUSE Bug 1209778 for CVE-2021-3923", "url": "https://bugzilla.suse.com/1209778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "low" } ], "title": "CVE-2021-3923" }, { "cve": "CVE-2022-4744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4744" } ], "notes": [ { "category": "general", "text": "A double-free flaw was found in the Linux kernel\u0027s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4744", "url": "https://www.suse.com/security/cve/CVE-2022-4744" }, { "category": "external", "summary": "SUSE Bug 1209635 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209635" }, { "category": "external", "summary": "SUSE Bug 1209672 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209672" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "important" } ], "title": "CVE-2022-4744" }, { "cve": "CVE-2023-0394", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0394" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0394", "url": "https://www.suse.com/security/cve/CVE-2023-0394" }, { "category": "external", "summary": "SUSE Bug 1207168 for CVE-2023-0394", "url": "https://bugzilla.suse.com/1207168" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "moderate" } ], "title": "CVE-2023-0394" }, { "cve": "CVE-2023-0461", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0461" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock.\n\nWhen CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt TCP_ULP operation does not require any privilege.\n\nWe recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0461", "url": "https://www.suse.com/security/cve/CVE-2023-0461" }, { "category": "external", "summary": "SUSE Bug 1208787 for CVE-2023-0461", "url": "https://bugzilla.suse.com/1208787" }, { "category": "external", "summary": "SUSE Bug 1208911 for CVE-2023-0461", "url": "https://bugzilla.suse.com/1208911" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-0461", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1217079 for CVE-2023-0461", "url": "https://bugzilla.suse.com/1217079" }, { "category": "external", "summary": "SUSE Bug 1218514 for CVE-2023-0461", "url": "https://bugzilla.suse.com/1218514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "important" } ], "title": "CVE-2023-0461" }, { "cve": "CVE-2023-1075", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1075" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel. The tls_is_tx_ready() incorrectly checks for list emptiness, potentially accessing a type confused entry to the list_head, leaking the last byte of the confused field that overlaps with rec-\u003etx_ready.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1075", "url": "https://www.suse.com/security/cve/CVE-2023-1075" }, { "category": "external", "summary": "SUSE Bug 1208598 for CVE-2023-1075", "url": "https://bugzilla.suse.com/1208598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "moderate" } ], "title": "CVE-2023-1075" }, { "cve": "CVE-2023-1076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1076" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1076", "url": "https://www.suse.com/security/cve/CVE-2023-1076" }, { "category": "external", "summary": "SUSE Bug 1208599 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1208599" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "moderate" } ], "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1078" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1078", "url": "https://www.suse.com/security/cve/CVE-2023-1078" }, { "category": "external", "summary": "SUSE Bug 1208601 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208601" }, { "category": "external", "summary": "SUSE Bug 1208603 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208603" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "important" } ], "title": "CVE-2023-1078" }, { "cve": "CVE-2023-1095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1095" } ], "notes": [ { "category": "general", "text": "In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1095", "url": "https://www.suse.com/security/cve/CVE-2023-1095" }, { "category": "external", "summary": "SUSE Bug 1208777 for CVE-2023-1095", "url": "https://bugzilla.suse.com/1208777" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "moderate" } ], "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1281" } ], "notes": [ { "category": "general", "text": "Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when \u0027tcf_exts_exec()\u0027 is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root.\nThis issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1281", "url": "https://www.suse.com/security/cve/CVE-2023-1281" }, { "category": "external", "summary": "SUSE Bug 1209634 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1209634" }, { "category": "external", "summary": "SUSE Bug 1209683 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1209683" }, { "category": "external", "summary": "SUSE Bug 1210335 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1210335" }, { "category": "external", "summary": "SUSE Bug 1210423 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1210423" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "important" } ], "title": "CVE-2023-1281" }, { "cve": "CVE-2023-1382", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1382" } ], "notes": [ { "category": "general", "text": "A data race flaw was found in the Linux kernel, between where con is allocated and con-\u003esock is set. This issue leads to a NULL pointer dereference when accessing con-\u003esock-\u003esk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1382", "url": "https://www.suse.com/security/cve/CVE-2023-1382" }, { "category": "external", "summary": "SUSE Bug 1209288 for CVE-2023-1382", "url": "https://bugzilla.suse.com/1209288" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "moderate" } ], "title": "CVE-2023-1382" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1513" } ], "notes": [ { "category": "general", "text": "A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1513", "url": "https://www.suse.com/security/cve/CVE-2023-1513" }, { "category": "external", "summary": "SUSE Bug 1209532 for CVE-2023-1513", "url": "https://bugzilla.suse.com/1209532" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "low" } ], "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1582", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1582" } ], "notes": [ { "category": "general", "text": "A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1582", "url": "https://www.suse.com/security/cve/CVE-2023-1582" }, { "category": "external", "summary": "SUSE Bug 1209636 for CVE-2023-1582", "url": "https://bugzilla.suse.com/1209636" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "moderate" } ], "title": "CVE-2023-1582" }, { "cve": "CVE-2023-23004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23004", "url": "https://www.suse.com/security/cve/CVE-2023-23004" }, { "category": "external", "summary": "SUSE Bug 1208843 for CVE-2023-23004", "url": "https://bugzilla.suse.com/1208843" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "moderate" } ], "title": "CVE-2023-23004" }, { "cve": "CVE-2023-25012", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-25012" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-25012", "url": "https://www.suse.com/security/cve/CVE-2023-25012" }, { "category": "external", "summary": "SUSE Bug 1207560 for CVE-2023-25012", "url": "https://bugzilla.suse.com/1207560" }, { "category": "external", "summary": "SUSE Bug 1207846 for CVE-2023-25012", "url": "https://bugzilla.suse.com/1207846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "moderate" } ], "title": "CVE-2023-25012" }, { "cve": "CVE-2023-28327", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28327" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28327", "url": "https://www.suse.com/security/cve/CVE-2023-28327" }, { "category": "external", "summary": "SUSE Bug 1209290 for CVE-2023-28327", "url": "https://bugzilla.suse.com/1209290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "moderate" } ], "title": "CVE-2023-28327" }, { "cve": "CVE-2023-28328", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28328" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28328", "url": "https://www.suse.com/security/cve/CVE-2023-28328" }, { "category": "external", "summary": "SUSE Bug 1209291 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1209291" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "moderate" } ], "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28464" } ], "notes": [ { "category": "general", "text": "hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28464", "url": "https://www.suse.com/security/cve/CVE-2023-28464" }, { "category": "external", "summary": "SUSE Bug 1209052 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1209052" }, { "category": "external", "summary": "SUSE Bug 1211111 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1211111" }, { "category": "external", "summary": "SUSE Bug 1220130 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1220130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "important" } ], "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-28772", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28772" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28772", "url": "https://www.suse.com/security/cve/CVE-2023-28772" }, { "category": "external", "summary": "SUSE Bug 1209549 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1209549" }, { "category": "external", "summary": "SUSE Bug 1211110 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1211110" }, { "category": "external", "summary": "SUSE Bug 1214378 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1214378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_118-default-1-150300.7.3.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Real Time 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Real Time 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.118.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Proxy 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Proxy 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Proxy 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.s390x", "SUSE Manager Server 4.2:kernel-default-base-5.3.18-150300.59.118.1.150300.18.68.1.x86_64", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.ppc64le", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.s390x", "SUSE Manager Server 4.2:kernel-default-devel-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-devel-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-macros-5.3.18-150300.59.118.1.noarch", "SUSE Manager Server 4.2:kernel-preempt-5.3.18-150300.59.118.1.x86_64", "SUSE Manager Server 4.2:kernel-zfcpdump-5.3.18-150300.59.118.1.s390x", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.118.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.118.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:33:47Z", "details": "important" } ], "title": "CVE-2023-28772" } ] }
suse-su-2023:2694-1
Vulnerability from csaf_suse
Published
2023-06-28 15:35
Modified
2023-06-28 15:35
Summary
Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP2)
Description of the patch
This update for the Linux Kernel 5.3.18-150200_24_126 fixes several issues.
The following security issues were fixed:
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209672).
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).
Patchnames
SUSE-2023-2694,SUSE-SLE-Module-Live-Patching-15-SP2-2023-2694
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-150200_24_126 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209672).\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2694,SUSE-SLE-Module-Live-Patching-15-SP2-2023-2694", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2694-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2694-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232694-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2694-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015352.html" }, { "category": "self", "summary": "SUSE Bug 1207189", "url": "https://bugzilla.suse.com/1207189" }, { "category": "self", "summary": "SUSE Bug 1209672", "url": "https://bugzilla.suse.com/1209672" }, { "category": "self", "summary": "SUSE Bug 1210452", "url": "https://bugzilla.suse.com/1210452" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4744 page", "url": "https://www.suse.com/security/cve/CVE-2022-4744/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP2)", "tracking": { "current_release_date": "2023-06-28T15:35:13Z", "generator": { "date": "2023-06-28T15:35:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2694-1", "initial_release_date": "2023-06-28T15:35:13Z", "revision_history": [ { "date": "2023-06-28T15:35:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_126-preempt-12-150200.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150200_24_126-preempt-12-150200.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150200_24_126-preempt-12-150200.2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-4744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4744" } ], "notes": [ { "category": "general", "text": "A double-free flaw was found in the Linux kernel\u0027s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4744", "url": "https://www.suse.com/security/cve/CVE-2022-4744" }, { "category": "external", "summary": "SUSE Bug 1209635 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209635" }, { "category": "external", "summary": "SUSE Bug 1209672 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209672" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T15:35:13Z", "details": "important" } ], "title": "CVE-2022-4744" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T15:35:13Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T15:35:13Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T15:35:13Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_126-default-12-150200.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T15:35:13Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:2679-1
Vulnerability from csaf_suse
Published
2023-06-28 11:34
Modified
2023-06-28 11:34
Summary
Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP1)
Description of the patch
This update for the Linux Kernel 4.12.14-150100_197_131 fixes several issues.
The following security issues were fixed:
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).
Patchnames
SUSE-2023-2679,SUSE-SLE-Module-Live-Patching-15-SP1-2023-2679
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-150100_197_131 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2679,SUSE-SLE-Module-Live-Patching-15-SP1-2023-2679", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2679-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2679-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232679-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2679-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015351.html" }, { "category": "self", "summary": "SUSE Bug 1207189", "url": "https://bugzilla.suse.com/1207189" }, { "category": "self", "summary": "SUSE Bug 1210452", "url": "https://bugzilla.suse.com/1210452" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP1)", "tracking": { "current_release_date": "2023-06-28T11:34:23Z", "generator": { "date": "2023-06-28T11:34:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2679-1", "initial_release_date": "2023-06-28T11:34:23Z", "revision_history": [ { "date": "2023-06-28T11:34:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T11:34:23Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T11:34:23Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T11:34:23Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_131-default-6-150100.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T11:34:23Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:2686-1
Vulnerability from csaf_suse
Published
2023-06-28 13:09
Modified
2023-06-28 13:09
Summary
Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP5)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP5)
Description of the patch
This update for the Linux Kernel 4.12.14-122_144 fixes several issues.
The following security issues were fixed:
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).
Patchnames
SUSE-2023-2686,SUSE-SLE-Live-Patching-12-SP5-2023-2686
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP5)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-122_144 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2686,SUSE-SLE-Live-Patching-12-SP5-2023-2686", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2686-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2686-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232686-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2686-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-June/030114.html" }, { "category": "self", "summary": "SUSE Bug 1207189", "url": "https://bugzilla.suse.com/1207189" }, { "category": "self", "summary": "SUSE Bug 1210452", "url": "https://bugzilla.suse.com/1210452" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP5)", "tracking": { "current_release_date": "2023-06-28T13:09:43Z", "generator": { "date": "2023-06-28T13:09:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2686-1", "initial_release_date": "2023-06-28T13:09:43Z", "revision_history": [ { "date": "2023-06-28T13:09:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_144-default-6-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_144-default-6-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_144-default-6-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_144-default-6-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_144-default-6-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T13:09:43Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T13:09:43Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T13:09:43Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_144-default-6-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T13:09:43Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:2702-1
Vulnerability from csaf_suse
Published
2023-06-29 10:23
Modified
2023-06-29 10:23
Summary
Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP1)
Description of the patch
This update for the Linux Kernel 4.12.14-150100_197_117 fixes several issues.
The following security issues were fixed:
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).
Patchnames
SUSE-2023-2702,SUSE-SLE-Live-Patching-12-SP5-2023-2702,SUSE-SLE-Module-Live-Patching-15-SP1-2023-2704
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-150100_197_117 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2702,SUSE-SLE-Live-Patching-12-SP5-2023-2702,SUSE-SLE-Module-Live-Patching-15-SP1-2023-2704", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2702-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2702-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232702-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2702-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-June/030142.html" }, { "category": "self", "summary": "SUSE Bug 1207189", "url": "https://bugzilla.suse.com/1207189" }, { "category": "self", "summary": "SUSE Bug 1210452", "url": "https://bugzilla.suse.com/1210452" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP1)", "tracking": { "current_release_date": "2023-06-29T10:23:52Z", "generator": { "date": "2023-06-29T10:23:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2702-1", "initial_release_date": "2023-06-29T10:23:52Z", "revision_history": [ { "date": "2023-06-29T10:23:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_127-default-11-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_127-default-11-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_127-default-11-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_127-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_127-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T10:23:52Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T10:23:52Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T10:23:52Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-11-2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_117-default-11-150100.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T10:23:52Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:2666-1
Vulnerability from csaf_suse
Published
2023-06-27 22:34
Modified
2023-06-27 22:34
Summary
Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP4)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP4)
Description of the patch
This update for the Linux Kernel 4.12.14-95_120 fixes several issues.
The following security issues were fixed:
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
Patchnames
SUSE-2023-2666,SUSE-SLE-Live-Patching-12-SP4-2023-2666
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP4)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-95_120 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2666,SUSE-SLE-Live-Patching-12-SP4-2023-2666", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2666-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2666-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232666-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2666-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015345.html" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP4)", "tracking": { "current_release_date": "2023-06-27T22:34:50Z", "generator": { "date": "2023-06-27T22:34:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2666-1", "initial_release_date": "2023-06-27T22:34:50Z", "revision_history": [ { "date": "2023-06-27T22:34:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_120-default-4-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_120-default-4-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_120-default-4-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_120-default-4-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_120-default-4-2.1.s390x", "product_id": "kgraft-patch-4_12_14-95_120-default-4-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_120-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_120-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_120-default-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_120-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_120-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_120-default-4-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_120-default-4-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_120-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_120-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-27T22:34:50Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_120-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-27T22:34:50Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:2660-1
Vulnerability from csaf_suse
Published
2023-06-27 17:34
Modified
2023-06-27 17:34
Summary
Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP4)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP4)
Description of the patch
This update for the Linux Kernel 4.12.14-95_102 fixes several issues.
The following security issues were fixed:
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
Patchnames
SUSE-2023-2660,SUSE-SLE-Live-Patching-12-SP4-2023-2660
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP4)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-95_102 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2660,SUSE-SLE-Live-Patching-12-SP4-2023-2660", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2660-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2660-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232660-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2660-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-June/030088.html" }, { "category": "self", "summary": "SUSE Bug 1207189", "url": "https://bugzilla.suse.com/1207189" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP4)", "tracking": { "current_release_date": "2023-06-27T17:34:13Z", "generator": { "date": "2023-06-27T17:34:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2660-1", "initial_release_date": "2023-06-27T17:34:13Z", "revision_history": [ { "date": "2023-06-27T17:34:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_102-default-11-2.3.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_102-default-11-2.3.ppc64le", "product_id": "kgraft-patch-4_12_14-95_102-default-11-2.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_102-default-11-2.3.s390x", "product": { "name": "kgraft-patch-4_12_14-95_102-default-11-2.3.s390x", "product_id": "kgraft-patch-4_12_14-95_102-default-11-2.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_102-default-11-2.3.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_102-default-11-2.3.x86_64", "product_id": "kgraft-patch-4_12_14-95_102-default-11-2.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_102-default-11-2.3.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_102-default-11-2.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_102-default-11-2.3.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_102-default-11-2.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_102-default-11-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_102-default-11-2.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-27T17:34:13Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-27T17:34:13Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_102-default-11-2.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-27T17:34:13Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:2718-1
Vulnerability from csaf_suse
Published
2023-06-29 13:05
Modified
2023-06-29 13:05
Summary
Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP5)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP5)
Description of the patch
This update for the Linux Kernel 4.12.14-122_130 fixes several issues.
The following security issues were fixed:
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).
Patchnames
SUSE-2023-2718,SUSE-SLE-Live-Patching-12-SP5-2023-2718
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP5)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-122_130 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2718,SUSE-SLE-Live-Patching-12-SP5-2023-2718", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2718-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2718-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232718-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2718-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-June/030134.html" }, { "category": "self", "summary": "SUSE Bug 1207189", "url": "https://bugzilla.suse.com/1207189" }, { "category": "self", "summary": "SUSE Bug 1210452", "url": "https://bugzilla.suse.com/1210452" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP5)", "tracking": { "current_release_date": "2023-06-29T13:05:18Z", "generator": { "date": "2023-06-29T13:05:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2718-1", "initial_release_date": "2023-06-29T13:05:18Z", "revision_history": [ { "date": "2023-06-29T13:05:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_130-default-11-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_130-default-11-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_130-default-11-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_130-default-11-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_130-default-11-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T13:05:18Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T13:05:18Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T13:05:18Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_130-default-11-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T13:05:18Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:1803-1
Vulnerability from csaf_suse
Published
2023-04-10 09:07
Modified
2023-04-10 09:07
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).
- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).
- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).
- CVE-2022-20567: Fixed use after free that could lead to a local privilege escalation in pppol2tp_create of l2tp_ppp.c (bsc#1208850).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).
- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).
- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).
- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).
- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).
The following non-security bugs were fixed:
- Bluetooth: btusb: Add VID:PID 13d3:3529 for Realtek RTL8821CE (git-fixes).
- Bluetooth: btusb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- Do not sign the vanilla kernel (bsc#1209008).
- Input: atmel_mxt_ts - fix double free in mxt_read_info_block (git-fixes).
- KVM: arm64: Hide system instruction access to Trace registers (git-fixes)
- NFSv4: Fix hangs when recovering open state after a server reboot (git-fixes). [iivanov] Fix Patch-mainline to v6.3-rc5
- PCI/MSI: Enforce MSI entry updates to be visible (git-fixes).
- PCI/MSI: Enforce that MSI-X table entry is masked for update (git-fixes).
- PCI/MSI: Mask all unused MSI-X entries (git-fixes).
- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).
- PCI/PM: Always return devices to D0 when thawing (git-fixes).
- PCI/PM: Avoid using device_may_wakeup() for runtime PM (git-fixes).
- PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints (git-fixes).
- PCI: Add ACS quirk for iProc PAXB (git-fixes).
- PCI: Avoid FLR for AMD Matisse HD Audio & USB 3.0 (git-fixes).
- PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).
- PCI: Make ACS quirk implementations more uniform (git-fixes).
- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).
- PCI: PM: Avoid skipping bus-level PM on platforms without ACPI (git-fixes).
- PCI: Unify ACS quirk desired vs provided checking (git-fixes).
- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).
- PCI: aardvark: Do not blindly enable ASPM L0s and do not write to read-only register (git-fixes).
- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).
- PCI: aardvark: Do not touch PCIe registers if no card connected (git-fixes).
- PCI: aardvark: Fix a leaked reference by adding missing of_node_put() (git-fixes).
- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).
- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).
- PCI: aardvark: Improve link training (git-fixes).
- PCI: aardvark: Indicate error in 'val' when config read fails (git-fixes).
- PCI: aardvark: Introduce an advk_pcie_valid_device() helper (git-fixes).
- PCI: aardvark: Remove PCIe outbound window configuration (git-fixes).
- PCI: aardvark: Train link immediately after enabling training (git-fixes).
- PCI: aardvark: Wait for endpoint to be ready before training link (git-fixes).
- PCI: endpoint: Cast the page number to phys_addr_t (git-fixes).
- PCI: endpoint: Fix for concurrent memory allocation in OB address region (git-fixes).
- PCI: hv: Add a per-bus mutex state_lock (bsc#1207001).
- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207001).
- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207001).
- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1207001).
- PCI: qcom: Use PHY_REFCLK_USE_PAD only for ipq8064 (git-fixes).
- PCI: tegra: Fix OF node reference leak (git-fixes).
- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).
- PM: hibernate: flush swap writer after marking (git-fixes).
- README.BRANCH: Adding myself to the maintainer list
- README: remove copy of config and update the text (bsc#1191924)
- Revert 'PCI: hv: Fix a timing issue which causes kdump to fail occasionally' (bsc#1207001).
- Revert 'arm64: dts: juno: add dma-ranges property' (git-fixes)
- Revert 'mei: me: enable asynchronous probing' (bsc#1208048, bsc#1209126).
- SUNRPC: Fix a server shutdown leak (git-fixes).
- applicom: Fix PCI device refcount leak in applicom_init() (git-fixes).
- arm64/alternatives: do not patch up internal branches (git-fixes)
- arm64/alternatives: move length validation inside the subsection (git-fixes)
- arm64/alternatives: use subsections for replacement sequences (git-fixes)
- arm64/cpufeature: Fix field sign for DIT hwcap detection (git-fixes)
- arm64/mm: fix variable 'pud' set but not used (git-fixes)
- arm64/mm: return cpu_all_mask when node is NUMA_NO_NODE (git-fixes)
- arm64/vdso: Discard .note.gnu.property sections in vDSO (git-fixes)
- arm64: Discard .note.GNU-stack section (bsc#1203693 bsc#1209798).
- arm64: Do not forget syscall when starting a new thread. (git-fixes)
- arm64: Fix compiler warning from pte_unmap() with (git-fixes)
- arm64: Mark __stack_chk_guard as __ro_after_init (git-fixes)
- arm64: Use test_tsk_thread_flag() for checking TIF_SINGLESTEP (git-fixes)
- arm64: cmpxchg_double*: hazard against entire exchange variable (git-fixes)
- arm64: cpu_ops: fix a leaked reference by adding missing of_node_put (git-fixes)
- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes)
- arm64: kprobe: make page to RO mode when allocate it (git-fixes)
- arm64: kpti: ensure patched kernel text is fetched from PoU (git-fixes)
- arm64: psci: Avoid printing in cpu_psci_cpu_die() (git-fixes)
- arm64: psci: Reduce the waiting time for cpu_psci_cpu_kill() (git-fixes)
- arm64: unwind: Prohibit probing on return_address() (git-fixes)
- crypto: arm64 - Fix unused variable compilation warnings of (git-fixes)
- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).
- ftrace: Fix invalid address access in lookup_rec() when index is 0 (git-fixes).
- git_sort: tests: Adjust to new net repository location
- git_sort: tests: Fix tests failing on SLE15 Use the correct base image, pygit2 is not found by pythong otherwise.
- git_sort: tests: Kernel:tools does not have Leap repos, use SLE
- git_sort: tests: Use 15.4, 15.3 is EOL
- git_sort: tests: do not disable package repository GPG check This adds the Kernel repository key and enables GPG check for package installation inside containers.
- git_sort: tests: exit on error
- ima: Fix function name error in comment (git-fixes).
- ipv4: route: fix inet_rtm_getroute induced crash (git-fixes).
- kabi: PCI: endpoint: Fix for concurrent memory allocation in OB address region (git-fixes).
- kernel-module-subpackage: Fix expansion with -b parameter (bsc#1208179).
- kfifo: fix ternary sign extension bugs (git-fixes).
- kgdb: Drop malformed kernel doc comment (git-fixes).
- media: coda: Add check for dcoda_iram_alloc (git-fixes).
- media: coda: Add check for kmalloc (git-fixes).
- media: platform: ti: Add missing check for devm_regulator_get (git-fixes).
- net: usb: lan78xx: Limit packet length to skb->len (git-fixes).
- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).
- net: usb: smsc75xx: Limit packet length to skb->len (git-fixes).
- net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull (git-fixes).
- net: usb: smsc95xx: Limit packet length to skb->len (git-fixes).
- powerpc/btext: add missing of_node_put (bsc#1065729).
- powerpc/powernv/ioda: Skip unallocated resources when mapping to PE (bsc#1065729).
- powerpc/pseries/lpar: add missing RTAS retry status handling (bsc#1109158 ltc#169177 git-fixes).
- powerpc/pseries/lparcfg: add missing RTAS retry status handling (bsc#1065729).
- powerpc/rtas: ensure 4KB alignment for rtas_data_buf (bsc#1065729).
- powerpc/xics: fix refcount leak in icp_opal_init() (bsc#1065729).
- ppc64le: HWPOISON_INJECT=m (bsc#1209572).
- ring-buffer: remove obsolete comment for free_buffer_page() (git-fixes).
- s390/vfio-ap: fix memory leak in vfio_ap device driver (git-fixes).
- sbitmap: Avoid lockups when waker gets preempted (bsc#1209118).
- scripts/osc_wrapper: Assign spec with *.spec file when building.
- scripts/sequence-patch.sh: remove obsolete egrep Avoids a warning and prepares for ultimate removal - boo#1203092
- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1199837).
- scsi: qla2xxx: Synchronize the IOCB count to be in order (bsc#1209292 bsc#1209684 bsc#1209556).
- timers/sched_clock: Prevent generic sched_clock wrap caused by tick_freeze() (git-fixes).
- timers: Clear timer_base::must_forward_clk with (bsc#1207890)
- tracing/hwlat: Replace sched_setaffinity with set_cpus_allowed_ptr (git-fixes).
- tracing: Add NULL checks for buffer in ring_buffer_free_read_page() (git-fixes).
- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).
- usb: dwc3: exynos: Fix remove() function (git-fixes).
- usb: dwc3: gadget: Stop processing more requests on IMI (git-fixes).
- usb: misc: iowarrior: fix up header size for USB_DEVICE_ID_CODEMERCS_IOW100 (git-fixes).
- usb: typec: altmodes/displayport: Fix probe pin assign check (git-fixes).
- x86/PCI: Fix PCI IRQ routing table memory leak (git-fixes).
- x86/apic: Add name to irq chip (bsc#1206010).
- x86/apic: Deinline x2apic functions (bsc#1181001 jsc#ECO-3191).
- x86/atomic: Fix smp_mb__{before,after}_atomic() (git-fixes).
- x86/build: Add 'set -e' to mkcapflags.sh to delete broken capflags.c (git-fixes).
- x86/ia32: Fix ia32_restore_sigcontext() AC leak (git-fixes).
- x86/ioapic: Force affinity setup before startup (bsc#1193231).
- x86/irq/64: Limit IST stack overflow check to #DB stack (git-fixes).
- x86/mm: Remove in_nmi() warning from 64-bit implementation of vmalloc_fault() (git-fixes).
- x86/paravirt: Fix callee-saved function ELF sizes (git-fixes).
- x86/power: Fix 'nosmt' vs hibernation triple fault during resume (git-fixes).
- x86/stacktrace: Prevent infinite loop in arch_stack_walk_user() (git-fixes).
- x86/uaccess, signal: Fix AC=1 bloat (git-fixes).
- x86/x2apic: Mark set_x2apic_phys_mode() as __init (bsc#1181001 jsc#ECO-3191).
- x86/xen: Fix memory leak in xen_init_lock_cpu() (git-fixes).
- x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() (git-fixes).
- xen-netfront: Fix NULL sring after live migration (git-fixes).
- xen-netfront: Fix mismatched rtnl_unlock (git-fixes).
- xen-netfront: Fix race between device setup and open (git-fixes).
- xen-netfront: Update features after registering netdev (git-fixes).
- xen-netfront: enable device after manual module load (git-fixes).
- xen-netfront: fix potential deadlock in xennet_remove() (git-fixes).
- xen-netfront: wait xenbus state change when load module manually (git-fixes).
- xen/netfront: fix waiting for xenbus state change (git-fixes).
- xen/netfront: stop tx queues during live migration (git-fixes).
- xen/platform-pci: add missing free_irq() in error path (git-fixes).
Patchnames
SUSE-2023-1803,SUSE-SLE-HA-12-SP5-2023-1803,SUSE-SLE-Live-Patching-12-SP5-2023-1803,SUSE-SLE-SDK-12-SP5-2023-1803,SUSE-SLE-SERVER-12-SP5-2023-1803,SUSE-SLE-WE-12-SP5-2023-1803
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).\n- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).\n- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).\n- CVE-2022-20567: Fixed use after free that could lead to a local privilege escalation in pppol2tp_create of l2tp_ppp.c (bsc#1208850).\n- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).\n- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).\n- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).\n- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).\n- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).\n- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).\n- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).\n- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).\n- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).\n\nThe following non-security bugs were fixed:\n\n- Bluetooth: btusb: Add VID:PID 13d3:3529 for Realtek RTL8821CE (git-fixes).\n- Bluetooth: btusb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- Do not sign the vanilla kernel (bsc#1209008).\n- Input: atmel_mxt_ts - fix double free in mxt_read_info_block (git-fixes).\n- KVM: arm64: Hide system instruction access to Trace registers (git-fixes)\n- NFSv4: Fix hangs when recovering open state after a server reboot (git-fixes). [iivanov] Fix Patch-mainline to v6.3-rc5\n- PCI/MSI: Enforce MSI entry updates to be visible (git-fixes).\n- PCI/MSI: Enforce that MSI-X table entry is masked for update (git-fixes).\n- PCI/MSI: Mask all unused MSI-X entries (git-fixes).\n- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).\n- PCI/PM: Always return devices to D0 when thawing (git-fixes).\n- PCI/PM: Avoid using device_may_wakeup() for runtime PM (git-fixes).\n- PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints (git-fixes).\n- PCI: Add ACS quirk for iProc PAXB (git-fixes).\n- PCI: Avoid FLR for AMD Matisse HD Audio \u0026 USB 3.0 (git-fixes).\n- PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).\n- PCI: Make ACS quirk implementations more uniform (git-fixes).\n- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).\n- PCI: PM: Avoid skipping bus-level PM on platforms without ACPI (git-fixes).\n- PCI: Unify ACS quirk desired vs provided checking (git-fixes).\n- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).\n- PCI: aardvark: Do not blindly enable ASPM L0s and do not write to read-only register (git-fixes).\n- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).\n- PCI: aardvark: Do not touch PCIe registers if no card connected (git-fixes).\n- PCI: aardvark: Fix a leaked reference by adding missing of_node_put() (git-fixes).\n- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).\n- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).\n- PCI: aardvark: Improve link training (git-fixes).\n- PCI: aardvark: Indicate error in \u0027val\u0027 when config read fails (git-fixes).\n- PCI: aardvark: Introduce an advk_pcie_valid_device() helper (git-fixes).\n- PCI: aardvark: Remove PCIe outbound window configuration (git-fixes).\n- PCI: aardvark: Train link immediately after enabling training (git-fixes).\n- PCI: aardvark: Wait for endpoint to be ready before training link (git-fixes).\n- PCI: endpoint: Cast the page number to phys_addr_t (git-fixes).\n- PCI: endpoint: Fix for concurrent memory allocation in OB address region (git-fixes).\n- PCI: hv: Add a per-bus mutex state_lock (bsc#1207001).\n- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207001).\n- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207001).\n- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1207001).\n- PCI: qcom: Use PHY_REFCLK_USE_PAD only for ipq8064 (git-fixes).\n- PCI: tegra: Fix OF node reference leak (git-fixes).\n- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).\n- PM: hibernate: flush swap writer after marking (git-fixes).\n- README.BRANCH: Adding myself to the maintainer list\n- README: remove copy of config and update the text (bsc#1191924)\n- Revert \u0027PCI: hv: Fix a timing issue which causes kdump to fail occasionally\u0027 (bsc#1207001).\n- Revert \u0027arm64: dts: juno: add dma-ranges property\u0027 (git-fixes)\n- Revert \u0027mei: me: enable asynchronous probing\u0027 (bsc#1208048, bsc#1209126).\n- SUNRPC: Fix a server shutdown leak (git-fixes).\n- applicom: Fix PCI device refcount leak in applicom_init() (git-fixes).\n- arm64/alternatives: do not patch up internal branches (git-fixes)\n- arm64/alternatives: move length validation inside the subsection (git-fixes)\n- arm64/alternatives: use subsections for replacement sequences (git-fixes)\n- arm64/cpufeature: Fix field sign for DIT hwcap detection (git-fixes)\n- arm64/mm: fix variable \u0027pud\u0027 set but not used (git-fixes)\n- arm64/mm: return cpu_all_mask when node is NUMA_NO_NODE (git-fixes)\n- arm64/vdso: Discard .note.gnu.property sections in vDSO (git-fixes)\n- arm64: Discard .note.GNU-stack section (bsc#1203693 bsc#1209798).\n- arm64: Do not forget syscall when starting a new thread. (git-fixes)\n- arm64: Fix compiler warning from pte_unmap() with (git-fixes)\n- arm64: Mark __stack_chk_guard as __ro_after_init (git-fixes)\n- arm64: Use test_tsk_thread_flag() for checking TIF_SINGLESTEP (git-fixes)\n- arm64: cmpxchg_double*: hazard against entire exchange variable (git-fixes)\n- arm64: cpu_ops: fix a leaked reference by adding missing of_node_put (git-fixes)\n- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes)\n- arm64: kprobe: make page to RO mode when allocate it (git-fixes)\n- arm64: kpti: ensure patched kernel text is fetched from PoU (git-fixes)\n- arm64: psci: Avoid printing in cpu_psci_cpu_die() (git-fixes)\n- arm64: psci: Reduce the waiting time for cpu_psci_cpu_kill() (git-fixes)\n- arm64: unwind: Prohibit probing on return_address() (git-fixes)\n- crypto: arm64 - Fix unused variable compilation warnings of (git-fixes)\n- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).\n- ftrace: Fix invalid address access in lookup_rec() when index is 0 (git-fixes).\n- git_sort: tests: Adjust to new net repository location\n- git_sort: tests: Fix tests failing on SLE15 Use the correct base image, pygit2 is not found by pythong otherwise.\n- git_sort: tests: Kernel:tools does not have Leap repos, use SLE\n- git_sort: tests: Use 15.4, 15.3 is EOL\n- git_sort: tests: do not disable package repository GPG check This adds the Kernel repository key and enables GPG check for package installation inside containers.\n- git_sort: tests: exit on error\n- ima: Fix function name error in comment (git-fixes).\n- ipv4: route: fix inet_rtm_getroute induced crash (git-fixes).\n- kabi: PCI: endpoint: Fix for concurrent memory allocation in OB address region (git-fixes).\n- kernel-module-subpackage: Fix expansion with -b parameter (bsc#1208179).\n- kfifo: fix ternary sign extension bugs (git-fixes).\n- kgdb: Drop malformed kernel doc comment (git-fixes).\n- media: coda: Add check for dcoda_iram_alloc (git-fixes).\n- media: coda: Add check for kmalloc (git-fixes).\n- media: platform: ti: Add missing check for devm_regulator_get (git-fixes).\n- net: usb: lan78xx: Limit packet length to skb-\u003elen (git-fixes).\n- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).\n- net: usb: smsc75xx: Limit packet length to skb-\u003elen (git-fixes).\n- net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull (git-fixes).\n- net: usb: smsc95xx: Limit packet length to skb-\u003elen (git-fixes).\n- powerpc/btext: add missing of_node_put (bsc#1065729).\n- powerpc/powernv/ioda: Skip unallocated resources when mapping to PE (bsc#1065729).\n- powerpc/pseries/lpar: add missing RTAS retry status handling (bsc#1109158 ltc#169177 git-fixes).\n- powerpc/pseries/lparcfg: add missing RTAS retry status handling (bsc#1065729).\n- powerpc/rtas: ensure 4KB alignment for rtas_data_buf (bsc#1065729).\n- powerpc/xics: fix refcount leak in icp_opal_init() (bsc#1065729).\n- ppc64le: HWPOISON_INJECT=m (bsc#1209572).\n- ring-buffer: remove obsolete comment for free_buffer_page() (git-fixes).\n- s390/vfio-ap: fix memory leak in vfio_ap device driver (git-fixes).\n- sbitmap: Avoid lockups when waker gets preempted (bsc#1209118).\n- scripts/osc_wrapper: Assign spec with *.spec file when building.\n- scripts/sequence-patch.sh: remove obsolete egrep Avoids a warning and prepares for ultimate removal - boo#1203092\n- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1199837).\n- scsi: qla2xxx: Synchronize the IOCB count to be in order (bsc#1209292 bsc#1209684 bsc#1209556).\n- timers/sched_clock: Prevent generic sched_clock wrap caused by tick_freeze() (git-fixes).\n- timers: Clear timer_base::must_forward_clk with (bsc#1207890)\n- tracing/hwlat: Replace sched_setaffinity with set_cpus_allowed_ptr (git-fixes).\n- tracing: Add NULL checks for buffer in ring_buffer_free_read_page() (git-fixes).\n- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).\n- usb: dwc3: exynos: Fix remove() function (git-fixes).\n- usb: dwc3: gadget: Stop processing more requests on IMI (git-fixes).\n- usb: misc: iowarrior: fix up header size for USB_DEVICE_ID_CODEMERCS_IOW100 (git-fixes).\n- usb: typec: altmodes/displayport: Fix probe pin assign check (git-fixes).\n- x86/PCI: Fix PCI IRQ routing table memory leak (git-fixes).\n- x86/apic: Add name to irq chip (bsc#1206010).\n- x86/apic: Deinline x2apic functions (bsc#1181001 jsc#ECO-3191).\n- x86/atomic: Fix smp_mb__{before,after}_atomic() (git-fixes).\n- x86/build: Add \u0027set -e\u0027 to mkcapflags.sh to delete broken capflags.c (git-fixes).\n- x86/ia32: Fix ia32_restore_sigcontext() AC leak (git-fixes).\n- x86/ioapic: Force affinity setup before startup (bsc#1193231).\n- x86/irq/64: Limit IST stack overflow check to #DB stack (git-fixes).\n- x86/mm: Remove in_nmi() warning from 64-bit implementation of vmalloc_fault() (git-fixes).\n- x86/paravirt: Fix callee-saved function ELF sizes (git-fixes).\n- x86/power: Fix \u0027nosmt\u0027 vs hibernation triple fault during resume (git-fixes).\n- x86/stacktrace: Prevent infinite loop in arch_stack_walk_user() (git-fixes).\n- x86/uaccess, signal: Fix AC=1 bloat (git-fixes).\n- x86/x2apic: Mark set_x2apic_phys_mode() as __init (bsc#1181001 jsc#ECO-3191).\n- x86/xen: Fix memory leak in xen_init_lock_cpu() (git-fixes).\n- x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() (git-fixes).\n- xen-netfront: Fix NULL sring after live migration (git-fixes).\n- xen-netfront: Fix mismatched rtnl_unlock (git-fixes).\n- xen-netfront: Fix race between device setup and open (git-fixes).\n- xen-netfront: Update features after registering netdev (git-fixes).\n- xen-netfront: enable device after manual module load (git-fixes).\n- xen-netfront: fix potential deadlock in xennet_remove() (git-fixes).\n- xen-netfront: wait xenbus state change when load module manually (git-fixes).\n- xen/netfront: fix waiting for xenbus state change (git-fixes).\n- xen/netfront: stop tx queues during live migration (git-fixes).\n- xen/platform-pci: add missing free_irq() in error path (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-1803,SUSE-SLE-HA-12-SP5-2023-1803,SUSE-SLE-Live-Patching-12-SP5-2023-1803,SUSE-SLE-SDK-12-SP5-2023-1803,SUSE-SLE-SERVER-12-SP5-2023-1803,SUSE-SLE-WE-12-SP5-2023-1803", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_1803-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:1803-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20231803-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:1803-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1076830", "url": "https://bugzilla.suse.com/1076830" }, { "category": "self", "summary": "SUSE Bug 1109158", "url": "https://bugzilla.suse.com/1109158" }, { "category": "self", "summary": "SUSE Bug 1181001", "url": "https://bugzilla.suse.com/1181001" }, { "category": "self", "summary": "SUSE Bug 1191924", "url": "https://bugzilla.suse.com/1191924" }, { "category": "self", "summary": "SUSE Bug 1193231", "url": "https://bugzilla.suse.com/1193231" }, { "category": "self", "summary": "SUSE Bug 1199837", "url": "https://bugzilla.suse.com/1199837" }, { "category": "self", "summary": "SUSE Bug 1203092", "url": "https://bugzilla.suse.com/1203092" }, { "category": "self", "summary": "SUSE Bug 1203693", "url": "https://bugzilla.suse.com/1203693" }, { "category": "self", "summary": "SUSE Bug 1206010", "url": "https://bugzilla.suse.com/1206010" }, { "category": "self", "summary": "SUSE Bug 1207001", "url": "https://bugzilla.suse.com/1207001" }, { "category": "self", "summary": "SUSE Bug 1207036", "url": "https://bugzilla.suse.com/1207036" }, { "category": "self", "summary": "SUSE Bug 1207125", "url": "https://bugzilla.suse.com/1207125" }, { "category": "self", "summary": "SUSE Bug 1207795", "url": "https://bugzilla.suse.com/1207795" }, { "category": "self", "summary": "SUSE Bug 1207890", "url": "https://bugzilla.suse.com/1207890" }, { "category": "self", "summary": "SUSE Bug 1208048", "url": "https://bugzilla.suse.com/1208048" }, { "category": "self", "summary": "SUSE Bug 1208179", "url": "https://bugzilla.suse.com/1208179" }, { "category": "self", "summary": "SUSE Bug 1208599", "url": "https://bugzilla.suse.com/1208599" }, { "category": "self", "summary": "SUSE Bug 1208777", "url": "https://bugzilla.suse.com/1208777" }, { "category": "self", "summary": "SUSE Bug 1208850", "url": "https://bugzilla.suse.com/1208850" }, { "category": "self", "summary": "SUSE Bug 1209008", "url": "https://bugzilla.suse.com/1209008" }, { "category": "self", "summary": "SUSE Bug 1209052", "url": "https://bugzilla.suse.com/1209052" }, { "category": "self", "summary": "SUSE Bug 1209118", "url": "https://bugzilla.suse.com/1209118" }, { "category": "self", "summary": "SUSE Bug 1209126", "url": "https://bugzilla.suse.com/1209126" }, { "category": "self", "summary": "SUSE Bug 1209256", "url": "https://bugzilla.suse.com/1209256" }, { "category": "self", "summary": "SUSE Bug 1209289", "url": "https://bugzilla.suse.com/1209289" }, { "category": "self", "summary": "SUSE Bug 1209291", "url": "https://bugzilla.suse.com/1209291" }, { "category": "self", "summary": "SUSE Bug 1209292", "url": "https://bugzilla.suse.com/1209292" }, { "category": "self", "summary": "SUSE Bug 1209532", "url": "https://bugzilla.suse.com/1209532" }, { "category": "self", "summary": "SUSE Bug 1209547", "url": "https://bugzilla.suse.com/1209547" }, { "category": "self", "summary": "SUSE Bug 1209549", "url": "https://bugzilla.suse.com/1209549" }, { "category": "self", "summary": "SUSE Bug 1209556", "url": "https://bugzilla.suse.com/1209556" }, { "category": "self", "summary": "SUSE Bug 1209572", "url": "https://bugzilla.suse.com/1209572" }, { "category": "self", "summary": "SUSE Bug 1209634", "url": "https://bugzilla.suse.com/1209634" }, { "category": "self", "summary": "SUSE Bug 1209684", "url": "https://bugzilla.suse.com/1209684" }, { "category": "self", "summary": "SUSE Bug 1209778", "url": "https://bugzilla.suse.com/1209778" }, { "category": "self", "summary": "SUSE Bug 1209798", "url": "https://bugzilla.suse.com/1209798" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3923 page", "url": "https://www.suse.com/security/cve/CVE-2021-3923/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20567 page", "url": "https://www.suse.com/security/cve/CVE-2022-20567/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0590 page", "url": "https://www.suse.com/security/cve/CVE-2023-0590/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1076 page", "url": "https://www.suse.com/security/cve/CVE-2023-1076/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1095 page", "url": "https://www.suse.com/security/cve/CVE-2023-1095/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1281 page", "url": "https://www.suse.com/security/cve/CVE-2023-1281/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1513 page", "url": "https://www.suse.com/security/cve/CVE-2023-1513/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23454 page", "url": "https://www.suse.com/security/cve/CVE-2023-23454/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28328 page", "url": "https://www.suse.com/security/cve/CVE-2023-28328/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28464 page", "url": "https://www.suse.com/security/cve/CVE-2023-28464/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28772 page", "url": "https://www.suse.com/security/cve/CVE-2023-28772/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2023-04-10T09:07:18Z", "generator": { "date": "2023-04-10T09:07:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:1803-1", "initial_release_date": "2023-04-10T09:07:18Z", "revision_history": [ { "date": "2023-04-10T09:07:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.156.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.156.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-122.156.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.156.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-122.156.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-122.156.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.156.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-122.156.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-122.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.156.1.aarch64", "product": { "name": "kernel-default-4.12.14-122.156.1.aarch64", "product_id": "kernel-default-4.12.14-122.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.156.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-122.156.1.aarch64", "product_id": "kernel-default-base-4.12.14-122.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.156.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-122.156.1.aarch64", "product_id": "kernel-default-devel-4.12.14-122.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.156.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-122.156.1.aarch64", "product_id": "kernel-default-extra-4.12.14-122.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.156.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-122.156.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-122.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.156.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.156.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.156.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-122.156.1.aarch64", "product_id": "kernel-obs-build-4.12.14-122.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.156.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-122.156.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-122.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.156.1.aarch64", "product": { "name": "kernel-syms-4.12.14-122.156.1.aarch64", "product_id": "kernel-syms-4.12.14-122.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.156.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-122.156.1.aarch64", "product_id": "kernel-vanilla-4.12.14-122.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.156.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-122.156.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-122.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.156.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.156.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-122.156.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.156.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.156.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.156.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.156.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-122.156.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-122.156.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.156.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.156.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-122.156.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-122.156.1.noarch", "product": { "name": "kernel-devel-4.12.14-122.156.1.noarch", "product_id": "kernel-devel-4.12.14-122.156.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-122.156.1.noarch", "product": { "name": "kernel-docs-4.12.14-122.156.1.noarch", "product_id": "kernel-docs-4.12.14-122.156.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-122.156.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-122.156.1.noarch", "product_id": "kernel-docs-html-4.12.14-122.156.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-122.156.1.noarch", "product": { "name": "kernel-macros-4.12.14-122.156.1.noarch", "product_id": "kernel-macros-4.12.14-122.156.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-122.156.1.noarch", "product": { "name": "kernel-source-4.12.14-122.156.1.noarch", "product_id": "kernel-source-4.12.14-122.156.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-122.156.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-122.156.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-122.156.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.156.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-122.156.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.156.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-122.156.1.ppc64le", "product_id": "kernel-debug-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.156.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-122.156.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.156.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-122.156.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.156.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.156.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.156.1.ppc64le", "product": { "name": "kernel-default-4.12.14-122.156.1.ppc64le", "product_id": "kernel-default-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.156.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-122.156.1.ppc64le", "product_id": "kernel-default-base-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.156.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-122.156.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.156.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-122.156.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.156.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-122.156.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.156.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-122.156.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.156.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-122.156.1.ppc64le", "product_id": "kernel-syms-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.156.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-122.156.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.156.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-122.156.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.156.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-122.156.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.156.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.156.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.156.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-122.156.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-122.156.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-122.156.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.156.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-122.156.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.156.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-122.156.1.s390x", "product_id": "dlm-kmp-default-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.156.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-122.156.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.156.1.s390x", "product": { "name": "kernel-default-4.12.14-122.156.1.s390x", "product_id": "kernel-default-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.156.1.s390x", "product": { "name": "kernel-default-base-4.12.14-122.156.1.s390x", "product_id": "kernel-default-base-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.156.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-122.156.1.s390x", "product_id": "kernel-default-devel-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.156.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-122.156.1.s390x", "product_id": "kernel-default-extra-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.156.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-122.156.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-122.156.1.s390x", "product": { "name": "kernel-default-man-4.12.14-122.156.1.s390x", "product_id": "kernel-default-man-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.156.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-122.156.1.s390x", "product_id": "kernel-obs-build-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.156.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-122.156.1.s390x", "product_id": "kernel-obs-qa-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.156.1.s390x", "product": { "name": "kernel-syms-4.12.14-122.156.1.s390x", "product_id": "kernel-syms-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.156.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-122.156.1.s390x", "product_id": "kernel-vanilla-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.156.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-122.156.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.156.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-122.156.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.156.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.156.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-122.156.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-122.156.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-122.156.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-122.156.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "product_id": "kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.156.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-122.156.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-122.156.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.156.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-122.156.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-122.156.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.156.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-122.156.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.156.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-122.156.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-debug-4.12.14-122.156.1.x86_64", "product_id": "kernel-debug-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-122.156.1.x86_64", "product_id": "kernel-debug-base-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-122.156.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.156.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-default-4.12.14-122.156.1.x86_64", "product_id": "kernel-default-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-122.156.1.x86_64", "product_id": "kernel-default-base-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-122.156.1.x86_64", "product_id": "kernel-default-devel-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-122.156.1.x86_64", "product_id": "kernel-default-extra-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-122.156.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-122.156.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-122.156.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-122.156.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.156.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-122.156.1.x86_64", "product_id": "kernel-obs-build-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-122.156.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-syms-4.12.14-122.156.1.x86_64", "product_id": "kernel-syms-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-122.156.1.x86_64", "product_id": "kernel-vanilla-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-122.156.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.156.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.156.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.156.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.156.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-122.156.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-122.156.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-122.156.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.156.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.156.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.156.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.156.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-122.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.156.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-122.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.156.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-122.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.156.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.156.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-122.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.156.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.156.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.156.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.156.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.156.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.156.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-122.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.156.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-122.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.156.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-122.156.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch" }, "product_reference": "kernel-docs-4.12.14-122.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.156.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-122.156.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.156.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-122.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.156.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-122.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.156.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-122.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.156.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.156.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.156.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.156.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.156.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.156.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.156.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.156.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.156.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.156.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.156.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.156.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.156.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.156.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.156.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.156.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.156.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.156.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.156.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.156.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.156.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.156.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.156.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.156.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.156.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.156.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.156.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.156.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.156.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.156.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.156.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.156.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.156.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.156.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.156.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.156.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.156.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.156.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.156.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.156.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.156.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.156.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.156.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.156.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.156.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.156.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.156.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.156.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-122.156.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-122.156.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T09:07:18Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2021-3923", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3923" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3923", "url": "https://www.suse.com/security/cve/CVE-2021-3923" }, { "category": "external", "summary": "SUSE Bug 1209778 for CVE-2021-3923", "url": "https://bugzilla.suse.com/1209778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T09:07:18Z", "details": "low" } ], "title": "CVE-2021-3923" }, { "cve": "CVE-2022-20567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20567" } ], "notes": [ { "category": "general", "text": "In pppol2tp_create of l2tp_ppp.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-186777253References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20567", "url": "https://www.suse.com/security/cve/CVE-2022-20567" }, { "category": "external", "summary": "SUSE Bug 1208850 for CVE-2022-20567", "url": "https://bugzilla.suse.com/1208850" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T09:07:18Z", "details": "moderate" } ], "title": "CVE-2022-20567" }, { "cve": "CVE-2023-0590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0590" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0590", "url": "https://www.suse.com/security/cve/CVE-2023-0590" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207795 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207795" }, { "category": "external", "summary": "SUSE Bug 1207822 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207822" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1211495" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T09:07:18Z", "details": "important" } ], "title": "CVE-2023-0590" }, { "cve": "CVE-2023-1076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1076" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1076", "url": "https://www.suse.com/security/cve/CVE-2023-1076" }, { "category": "external", "summary": "SUSE Bug 1208599 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1208599" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T09:07:18Z", "details": "moderate" } ], "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1095" } ], "notes": [ { "category": "general", "text": "In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1095", "url": "https://www.suse.com/security/cve/CVE-2023-1095" }, { "category": "external", "summary": "SUSE Bug 1208777 for CVE-2023-1095", "url": "https://bugzilla.suse.com/1208777" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T09:07:18Z", "details": "moderate" } ], "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1281" } ], "notes": [ { "category": "general", "text": "Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when \u0027tcf_exts_exec()\u0027 is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root.\nThis issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1281", "url": "https://www.suse.com/security/cve/CVE-2023-1281" }, { "category": "external", "summary": "SUSE Bug 1209634 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1209634" }, { "category": "external", "summary": "SUSE Bug 1209683 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1209683" }, { "category": "external", "summary": "SUSE Bug 1210335 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1210335" }, { "category": "external", "summary": "SUSE Bug 1210423 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1210423" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T09:07:18Z", "details": "important" } ], "title": "CVE-2023-1281" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T09:07:18Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1513" } ], "notes": [ { "category": "general", "text": "A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1513", "url": "https://www.suse.com/security/cve/CVE-2023-1513" }, { "category": "external", "summary": "SUSE Bug 1209532 for CVE-2023-1513", "url": "https://bugzilla.suse.com/1209532" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T09:07:18Z", "details": "low" } ], "title": "CVE-2023-1513" }, { "cve": "CVE-2023-23454", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23454" } ], "notes": [ { "category": "general", "text": "cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23454", "url": "https://www.suse.com/security/cve/CVE-2023-23454" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207188 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1207188" }, { "category": "external", "summary": "SUSE Bug 1208030 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208030" }, { "category": "external", "summary": "SUSE Bug 1208044 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208044" }, { "category": "external", "summary": "SUSE Bug 1208085 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208085" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T09:07:18Z", "details": "important" } ], "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T09:07:18Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-28328", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28328" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28328", "url": "https://www.suse.com/security/cve/CVE-2023-28328" }, { "category": "external", "summary": "SUSE Bug 1209291 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1209291" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T09:07:18Z", "details": "moderate" } ], "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28464" } ], "notes": [ { "category": "general", "text": "hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28464", "url": "https://www.suse.com/security/cve/CVE-2023-28464" }, { "category": "external", "summary": "SUSE Bug 1209052 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1209052" }, { "category": "external", "summary": "SUSE Bug 1211111 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1211111" }, { "category": "external", "summary": "SUSE Bug 1220130 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1220130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T09:07:18Z", "details": "important" } ], "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28772", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28772" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28772", "url": "https://www.suse.com/security/cve/CVE-2023-28772" }, { "category": "external", "summary": "SUSE Bug 1209549 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1209549" }, { "category": "external", "summary": "SUSE Bug 1211110 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1211110" }, { "category": "external", "summary": "SUSE Bug 1214378 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1214378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_156-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.156.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.156.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.156.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-10T09:07:18Z", "details": "important" } ], "title": "CVE-2023-28772" } ] }
suse-su-2023:2805-1
Vulnerability from csaf_suse
Published
2023-07-11 04:31
Modified
2023-07-11 04:31
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).
- CVE-2022-3566: Fixed race condition in the TCP Handler (bsc#1204405).
- CVE-2022-45884: Fixed a use-after-free in dvbdev.c, related to dvb_register_device dynamically allocating fops (bsc#1205756).
- CVE-2022-45885: Fixed a race condition in dvb_frontend.c that could cause a use-after-free when a device is disconnected (bsc#1205758).
- CVE-2022-45886: Fixed a .disconnect versus dvb_device_open race condition in dvb_net.c that lead to a use-after-free (bsc#1205760).
- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).
- CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
- CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208600).
- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).
- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).
- CVE-2023-1249: Fixed a use-after-free flaw in the core dump subsystem that allowed a local user to crash the system (bsc#1209039).
- CVE-2023-1380: Fixed a slab-out-of-bound read problem in brcmf_get_assoc_ies() (bsc#1209287).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).
- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).
- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).
- CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).
- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).
- CVE-2023-2124: Fixed an out-of-bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).
- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).
- CVE-2023-2194: Fixed an out-of-bounds write vulnerability in the SLIMpro I2C device driver (bsc#1210715).
- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).
- CVE-2023-2513: Fixed a use-after-free vulnerability in the ext4 filesystem (bsc#1211105).
- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/uetooth/hci_conn.c (bsc#1209052).
- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).
- CVE-2023-30772: Fixed race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).
- CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212842).
- CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210940).
- CVE-2023-3159: Fixed use-after-free issue in driver/firewire in outbound_phy_packet_callback (bsc#1212128).
- CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154).
- CVE-2023-32269: Fixed a use-after-free in af_netrom.c, related to the fact that accept() was also allowed for a successfully connected AF_NETROM socket (bsc#1211186).
- CVE-2023-35824: Fixed a use-after-free in dm1105_remove in drivers/media/pci/dm1105/dm1105.c (bsc#1212501).
The following non-security bugs were fixed:
- Do not sign the vanilla kernel (bsc#1209008).
- Drop dvb-core fix patch due to regression (bsc#1205758).
- Revert CVE-2018-20784 due to regression (bsc#1126703).
- binfmt_elf: Take the mmap lock when walking the VMA list (bsc#1209039 CVE-2023-1249).
- bluetooth: Fix double free in hci_conn_cleanup (bsc#1209052 CVE-2023-28464).
- bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work (CVE-2023-1989 bsc#1210336).
- btrfs: fix race between quota disable and quota assign ioctls (CVE-2023-1611 bsc#1209687).
- do not fallthrough in cbq_classify and stop on TC_ACT_SHOT (bsc#1207036 CVE-2023-23454 bsc#1207125 CVE-2023-23455).
- ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878).
- ext4: fix use-after-free in ext4_xattr_set_entry (bsc#1206878 bsc#1211105 CVE-2023-2513).
- fbcon: Check font dimension limits (CVE-2023-3161 bsc#1212154).
- firewire: fix potential uaf in outbound_phy_packet_callback() (CVE-2023-3159 bsc#1212128).
- fix a mistake in the CVE-2023-0590 / bsc#1207795 backport
- i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() (bsc#1210715 CVE-2023-2194).
- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).
- ipvlan:Fix out-of-bounds caused by unclear skb->cb (bsc#1212842 CVE-2023-3090).
- kernel/sys.c: fix potential Spectre v1 issue (bsc#1209256 CVE-2017-5753).
- kvm: initialize all of the kvm_debugregs structure before sending it to userspace (bsc#1209532 CVE-2023-1513).
- media: dm1105: Fix use after free bug in dm1105_remove due to race condition (bsc#1212501 CVE-2023-35824).
- media: dvb-core: Fix use-after-free due on race condition at dvb_net (CVE-2022-45886 bsc#1205760).
- media: dvb-core: Fix use-after-free due to race at dvb_register_device() (CVE-2022-45884 bsc#1205756).
- media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 (CVE-2022-45919 bsc#1205803).
- media: dvb-core: Fix use-after-free on race condition at dvb_frontend (CVE-2022-45885 bsc#1205758).
- media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() (bsc#1209291 CVE-2023-28328).
- media: dvb_frontend: kABI workaround (CVE-2022-45885 bsc#1205758).
- media: dvb_net: kABI workaround (CVE-2022-45886 bsc#1205760).
- media: dvbdev: fix error logic at dvb_register_device() (CVE-2022-45884 bsc#1205756).
- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() (CVE-2023-1118 bsc#1208837).
- media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() (CVE-2022-45887 bsc#1205762).
- memstick: r592: Fix UAF bug in r592_remove due to race condition (CVE-2023-3141 bsc#1212129 bsc#1211449).
- net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg (bsc#1210940 CVE-2023-31436).
- netfilter: nf_tables: fix null deref due to zeroed list head (CVE-2023-1095 bsc#1208777).
- netrom: Fix use-after-free caused by accept on already connected socket (bsc#1211186 CVE-2023-32269).
- nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition (git-fixes bsc#1210337 CVE-2023-1990).
- power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition (CVE-2023-30772 bsc#1210329).
- prlimit: do_prlimit needs to have a speculation check (bsc#1209256 CVE-2017-5753).
- sched/rt: pick_next_rt_entity(): check list_entry (bsc#1208600 CVE-2023-1077).
- scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress (bsc#1210647 CVE-2023-2162).
- seq_buf: Fix overflow in seq_buf_putmem_hex() (bsc#1209549 CVE-2023-28772).
- tcp: Fix data races around icsk->icsk_af_ops (bsc#1204405 CVE-2022-3566).
- tipc: fix NULL deref in tipc_link_xmit() (bsc#1209289 CVE-2023-1390).
- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() (bsc#1209287 CVE-2023-1380).
- x86/speculation: Allow enabling STIBP with legacy IBRS (bsc#1210506 CVE-2023-1998).
- xfs: verify buffer contents when we skip log replay (bsc#1210498 CVE-2023-2124).
- xirc2ps_cs: Fix use after free bug in xirc2ps_detach (bsc#1209871 CVE-2023-1670).
Patchnames
SUSE-2023-2805,SUSE-SLE-SERVER-12-SP2-BCL-2023-2805
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).\n- CVE-2022-3566: Fixed race condition in the TCP Handler (bsc#1204405).\n- CVE-2022-45884: Fixed a use-after-free in dvbdev.c, related to dvb_register_device dynamically allocating fops (bsc#1205756).\n- CVE-2022-45885: Fixed a race condition in dvb_frontend.c that could cause a use-after-free when a device is disconnected (bsc#1205758).\n- CVE-2022-45886: Fixed a .disconnect versus dvb_device_open race condition in dvb_net.c that lead to a use-after-free (bsc#1205760).\n- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).\n- CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803).\n- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).\n- CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208600).\n- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).\n- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).\n- CVE-2023-1249: Fixed a use-after-free flaw in the core dump subsystem that allowed a local user to crash the system (bsc#1209039).\n- CVE-2023-1380: Fixed a slab-out-of-bound read problem in brcmf_get_assoc_ies() (bsc#1209287).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).\n- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).\n- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).\n- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).\n- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).\n- CVE-2023-1990: Fixed a use after free in ndlc_remove (bsc#1210337).\n- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).\n- CVE-2023-2124: Fixed an out-of-bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).\n- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).\n- CVE-2023-2194: Fixed an out-of-bounds write vulnerability in the SLIMpro I2C device driver (bsc#1210715).\n- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).\n- CVE-2023-2513: Fixed a use-after-free vulnerability in the ext4 filesystem (bsc#1211105).\n- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).\n- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/uetooth/hci_conn.c (bsc#1209052).\n- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).\n- CVE-2023-30772: Fixed race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).\n- CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212842).\n- CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129).\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210940).\n- CVE-2023-3159: Fixed use-after-free issue in driver/firewire in outbound_phy_packet_callback (bsc#1212128).\n- CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154).\n- CVE-2023-32269: Fixed a use-after-free in af_netrom.c, related to the fact that accept() was also allowed for a successfully connected AF_NETROM socket (bsc#1211186).\n- CVE-2023-35824: Fixed a use-after-free in dm1105_remove in drivers/media/pci/dm1105/dm1105.c (bsc#1212501).\n\nThe following non-security bugs were fixed:\n\n- Do not sign the vanilla kernel (bsc#1209008).\n- Drop dvb-core fix patch due to regression (bsc#1205758).\n- Revert CVE-2018-20784 due to regression (bsc#1126703).\n- binfmt_elf: Take the mmap lock when walking the VMA list (bsc#1209039 CVE-2023-1249).\n- bluetooth: Fix double free in hci_conn_cleanup (bsc#1209052 CVE-2023-28464).\n- bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work (CVE-2023-1989 bsc#1210336).\n- btrfs: fix race between quota disable and quota assign ioctls (CVE-2023-1611 bsc#1209687).\n- do not fallthrough in cbq_classify and stop on TC_ACT_SHOT (bsc#1207036 CVE-2023-23454 bsc#1207125 CVE-2023-23455).\n- ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878).\n- ext4: fix use-after-free in ext4_xattr_set_entry (bsc#1206878 bsc#1211105 CVE-2023-2513).\n- fbcon: Check font dimension limits (CVE-2023-3161 bsc#1212154).\n- firewire: fix potential uaf in outbound_phy_packet_callback() (CVE-2023-3159 bsc#1212128).\n- fix a mistake in the CVE-2023-0590 / bsc#1207795 backport\n- i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() (bsc#1210715 CVE-2023-2194).\n- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).\n- ipvlan:Fix out-of-bounds caused by unclear skb-\u003ecb (bsc#1212842 CVE-2023-3090).\n- kernel/sys.c: fix potential Spectre v1 issue (bsc#1209256 CVE-2017-5753).\n- kvm: initialize all of the kvm_debugregs structure before sending it to userspace (bsc#1209532 CVE-2023-1513).\n- media: dm1105: Fix use after free bug in dm1105_remove due to race condition (bsc#1212501 CVE-2023-35824).\n- media: dvb-core: Fix use-after-free due on race condition at dvb_net (CVE-2022-45886 bsc#1205760).\n- media: dvb-core: Fix use-after-free due to race at dvb_register_device() (CVE-2022-45884 bsc#1205756).\n- media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 (CVE-2022-45919 bsc#1205803).\n- media: dvb-core: Fix use-after-free on race condition at dvb_frontend (CVE-2022-45885 bsc#1205758).\n- media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer() (bsc#1209291 CVE-2023-28328).\n- media: dvb_frontend: kABI workaround (CVE-2022-45885 bsc#1205758).\n- media: dvb_net: kABI workaround (CVE-2022-45886 bsc#1205760).\n- media: dvbdev: fix error logic at dvb_register_device() (CVE-2022-45884 bsc#1205756).\n- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() (CVE-2023-1118 bsc#1208837).\n- media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() (CVE-2022-45887 bsc#1205762).\n- memstick: r592: Fix UAF bug in r592_remove due to race condition (CVE-2023-3141 bsc#1212129 bsc#1211449).\n- net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg (bsc#1210940 CVE-2023-31436).\n- netfilter: nf_tables: fix null deref due to zeroed list head (CVE-2023-1095 bsc#1208777).\n- netrom: Fix use-after-free caused by accept on already connected socket (bsc#1211186 CVE-2023-32269).\n- nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition (git-fixes bsc#1210337 CVE-2023-1990).\n- power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition (CVE-2023-30772 bsc#1210329).\n- prlimit: do_prlimit needs to have a speculation check (bsc#1209256 CVE-2017-5753).\n- sched/rt: pick_next_rt_entity(): check list_entry (bsc#1208600 CVE-2023-1077).\n- scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress (bsc#1210647 CVE-2023-2162).\n- seq_buf: Fix overflow in seq_buf_putmem_hex() (bsc#1209549 CVE-2023-28772).\n- tcp: Fix data races around icsk-\u003eicsk_af_ops (bsc#1204405 CVE-2022-3566).\n- tipc: fix NULL deref in tipc_link_xmit() (bsc#1209289 CVE-2023-1390).\n- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() (bsc#1209287 CVE-2023-1380).\n- x86/speculation: Allow enabling STIBP with legacy IBRS (bsc#1210506 CVE-2023-1998).\n- xfs: verify buffer contents when we skip log replay (bsc#1210498 CVE-2023-2124).\n- xirc2ps_cs: Fix use after free bug in xirc2ps_detach (bsc#1209871 CVE-2023-1670).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2805,SUSE-SLE-SERVER-12-SP2-BCL-2023-2805", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2805-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2805-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232805-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2805-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" }, { "category": "self", "summary": "SUSE Bug 1126703", "url": "https://bugzilla.suse.com/1126703" }, { "category": "self", "summary": "SUSE Bug 1204405", "url": "https://bugzilla.suse.com/1204405" }, { "category": "self", "summary": "SUSE Bug 1205756", "url": "https://bugzilla.suse.com/1205756" }, { "category": "self", "summary": "SUSE Bug 1205758", "url": "https://bugzilla.suse.com/1205758" }, { "category": "self", "summary": "SUSE Bug 1205760", "url": "https://bugzilla.suse.com/1205760" }, { "category": "self", "summary": "SUSE Bug 1205762", "url": "https://bugzilla.suse.com/1205762" }, { "category": "self", "summary": "SUSE Bug 1205803", "url": "https://bugzilla.suse.com/1205803" }, { "category": "self", "summary": "SUSE Bug 1206878", "url": "https://bugzilla.suse.com/1206878" }, { "category": "self", "summary": "SUSE Bug 1207036", "url": "https://bugzilla.suse.com/1207036" }, { "category": "self", "summary": "SUSE Bug 1207125", "url": "https://bugzilla.suse.com/1207125" }, { "category": "self", "summary": "SUSE Bug 1207168", "url": "https://bugzilla.suse.com/1207168" }, { "category": "self", "summary": "SUSE Bug 1207795", "url": "https://bugzilla.suse.com/1207795" }, { "category": "self", "summary": "SUSE Bug 1208600", "url": "https://bugzilla.suse.com/1208600" }, { "category": "self", "summary": "SUSE Bug 1208777", "url": "https://bugzilla.suse.com/1208777" }, { "category": "self", "summary": "SUSE Bug 1208837", "url": "https://bugzilla.suse.com/1208837" }, { "category": "self", "summary": "SUSE Bug 1209008", "url": "https://bugzilla.suse.com/1209008" }, { "category": "self", "summary": "SUSE Bug 1209039", "url": "https://bugzilla.suse.com/1209039" }, { "category": "self", "summary": "SUSE Bug 1209052", "url": "https://bugzilla.suse.com/1209052" }, { "category": "self", "summary": "SUSE Bug 1209256", "url": "https://bugzilla.suse.com/1209256" }, { "category": "self", "summary": "SUSE Bug 1209287", "url": "https://bugzilla.suse.com/1209287" }, { "category": "self", "summary": "SUSE Bug 1209289", "url": "https://bugzilla.suse.com/1209289" }, { "category": "self", "summary": "SUSE Bug 1209291", "url": "https://bugzilla.suse.com/1209291" }, { "category": "self", "summary": "SUSE Bug 1209532", "url": "https://bugzilla.suse.com/1209532" }, { "category": "self", "summary": "SUSE Bug 1209549", "url": "https://bugzilla.suse.com/1209549" }, { "category": "self", "summary": "SUSE Bug 1209687", "url": "https://bugzilla.suse.com/1209687" }, { "category": "self", "summary": "SUSE Bug 1209871", "url": "https://bugzilla.suse.com/1209871" }, { "category": "self", "summary": "SUSE Bug 1210329", "url": "https://bugzilla.suse.com/1210329" }, { "category": "self", "summary": "SUSE Bug 1210336", "url": "https://bugzilla.suse.com/1210336" }, { "category": "self", "summary": "SUSE Bug 1210337", "url": "https://bugzilla.suse.com/1210337" }, { "category": "self", "summary": "SUSE Bug 1210498", "url": "https://bugzilla.suse.com/1210498" }, { "category": "self", "summary": "SUSE Bug 1210506", "url": "https://bugzilla.suse.com/1210506" }, { "category": "self", "summary": "SUSE Bug 1210647", "url": "https://bugzilla.suse.com/1210647" }, { "category": "self", "summary": "SUSE Bug 1210715", "url": "https://bugzilla.suse.com/1210715" }, { "category": "self", "summary": "SUSE Bug 1210940", "url": "https://bugzilla.suse.com/1210940" }, { "category": "self", "summary": "SUSE Bug 1211105", "url": "https://bugzilla.suse.com/1211105" }, { "category": "self", "summary": "SUSE Bug 1211186", "url": "https://bugzilla.suse.com/1211186" }, { "category": "self", "summary": "SUSE Bug 1211449", "url": "https://bugzilla.suse.com/1211449" }, { "category": "self", "summary": "SUSE Bug 1212128", "url": "https://bugzilla.suse.com/1212128" }, { "category": "self", "summary": "SUSE Bug 1212129", "url": "https://bugzilla.suse.com/1212129" }, { "category": "self", "summary": "SUSE Bug 1212154", "url": "https://bugzilla.suse.com/1212154" }, { "category": "self", "summary": "SUSE Bug 1212501", "url": "https://bugzilla.suse.com/1212501" }, { "category": "self", "summary": "SUSE Bug 1212842", "url": "https://bugzilla.suse.com/1212842" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20784 page", "url": "https://www.suse.com/security/cve/CVE-2018-20784/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3566 page", "url": "https://www.suse.com/security/cve/CVE-2022-3566/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45884 page", "url": "https://www.suse.com/security/cve/CVE-2022-45884/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45885 page", "url": "https://www.suse.com/security/cve/CVE-2022-45885/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45886 page", "url": "https://www.suse.com/security/cve/CVE-2022-45886/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45887 page", "url": "https://www.suse.com/security/cve/CVE-2022-45887/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45919 page", "url": "https://www.suse.com/security/cve/CVE-2022-45919/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0590 page", "url": "https://www.suse.com/security/cve/CVE-2023-0590/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1077 page", "url": "https://www.suse.com/security/cve/CVE-2023-1077/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1095 page", "url": "https://www.suse.com/security/cve/CVE-2023-1095/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1118 page", "url": "https://www.suse.com/security/cve/CVE-2023-1118/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1249 page", "url": "https://www.suse.com/security/cve/CVE-2023-1249/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1380 page", "url": "https://www.suse.com/security/cve/CVE-2023-1380/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1513 page", "url": "https://www.suse.com/security/cve/CVE-2023-1513/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1611 page", "url": "https://www.suse.com/security/cve/CVE-2023-1611/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1670 page", "url": "https://www.suse.com/security/cve/CVE-2023-1670/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1989 page", "url": "https://www.suse.com/security/cve/CVE-2023-1989/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1990 page", "url": "https://www.suse.com/security/cve/CVE-2023-1990/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1998 page", "url": "https://www.suse.com/security/cve/CVE-2023-1998/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2124 page", "url": "https://www.suse.com/security/cve/CVE-2023-2124/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2162 page", "url": "https://www.suse.com/security/cve/CVE-2023-2162/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2194 page", "url": "https://www.suse.com/security/cve/CVE-2023-2194/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23454 page", "url": "https://www.suse.com/security/cve/CVE-2023-23454/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2513 page", "url": "https://www.suse.com/security/cve/CVE-2023-2513/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28328 page", "url": "https://www.suse.com/security/cve/CVE-2023-28328/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28464 page", "url": "https://www.suse.com/security/cve/CVE-2023-28464/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28772 page", "url": "https://www.suse.com/security/cve/CVE-2023-28772/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-30772 page", "url": "https://www.suse.com/security/cve/CVE-2023-30772/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3090 page", "url": "https://www.suse.com/security/cve/CVE-2023-3090/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3141 page", "url": "https://www.suse.com/security/cve/CVE-2023-3141/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3159 page", "url": "https://www.suse.com/security/cve/CVE-2023-3159/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3161 page", "url": "https://www.suse.com/security/cve/CVE-2023-3161/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-32269 page", "url": "https://www.suse.com/security/cve/CVE-2023-32269/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-35824 page", "url": "https://www.suse.com/security/cve/CVE-2023-35824/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2023-07-11T04:31:55Z", "generator": { "date": "2023-07-11T04:31:55Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2805-1", "initial_release_date": "2023-07-11T04:31:55Z", "revision_history": [ { "date": "2023-07-11T04:31:55Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.205.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.205.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.205.1.aarch64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.205.1.aarch64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.205.1.aarch64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.205.1.aarch64", "product_id": "cluster-network-kmp-default-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.205.1.aarch64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.205.1.aarch64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.205.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.121-92.205.1.aarch64", "product_id": "dlm-kmp-default-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.205.1.aarch64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.205.1.aarch64", "product_id": "dlm-kmp-vanilla-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.205.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.121-92.205.1.aarch64", "product_id": "gfs2-kmp-default-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.205.1.aarch64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.205.1.aarch64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-default-4.4.121-92.205.1.aarch64", "product_id": "kernel-default-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-default-base-4.4.121-92.205.1.aarch64", "product_id": "kernel-default-base-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-default-devel-4.4.121-92.205.1.aarch64", "product_id": "kernel-default-devel-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-default-extra-4.4.121-92.205.1.aarch64", "product_id": "kernel-default-extra-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.121-92.205.1.aarch64", "product_id": "kernel-default-kgraft-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-obs-build-4.4.121-92.205.1.aarch64", "product_id": "kernel-obs-build-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.121-92.205.1.aarch64", "product_id": "kernel-obs-qa-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-syms-4.4.121-92.205.1.aarch64", "product_id": "kernel-syms-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-vanilla-4.4.121-92.205.1.aarch64", "product_id": "kernel-vanilla-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.121-92.205.1.aarch64", "product_id": "kernel-vanilla-base-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.205.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.205.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.205.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.205.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.121-92.205.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.205.1.aarch64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.205.1.aarch64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.205.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.205.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.205.1.noarch", "product_id": "kernel-devel-4.4.121-92.205.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.121-92.205.1.noarch", "product": { "name": "kernel-docs-4.4.121-92.205.1.noarch", "product_id": "kernel-docs-4.4.121-92.205.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.121-92.205.1.noarch", "product": { "name": "kernel-docs-html-4.4.121-92.205.1.noarch", "product_id": "kernel-docs-html-4.4.121-92.205.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.121-92.205.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.121-92.205.1.noarch", "product_id": "kernel-docs-pdf-4.4.121-92.205.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.205.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.205.1.noarch", "product_id": "kernel-macros-4.4.121-92.205.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.205.1.noarch", "product": { "name": "kernel-source-4.4.121-92.205.1.noarch", "product_id": "kernel-source-4.4.121-92.205.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.121-92.205.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.121-92.205.1.noarch", "product_id": "kernel-source-vanilla-4.4.121-92.205.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.205.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.205.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.205.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.205.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.205.1.ppc64le", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.205.1.ppc64le", "product_id": "cluster-network-kmp-debug-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.205.1.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.205.1.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.205.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.121-92.205.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.205.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.205.1.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product_id": "dlm-kmp-vanilla-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.205.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.121-92.205.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.205.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.205.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product_id": "gfs2-kmp-vanilla-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-debug-4.4.121-92.205.1.ppc64le", "product_id": "kernel-debug-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.121-92.205.1.ppc64le", "product_id": "kernel-debug-base-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.121-92.205.1.ppc64le", "product_id": "kernel-debug-devel-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.121-92.205.1.ppc64le", "product_id": "kernel-debug-extra-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.121-92.205.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.205.1.ppc64le", "product_id": "kernel-default-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.205.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.205.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.121-92.205.1.ppc64le", "product_id": "kernel-default-extra-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.121-92.205.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.121-92.205.1.ppc64le", "product_id": "kernel-obs-build-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.121-92.205.1.ppc64le", "product_id": "kernel-obs-qa-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.205.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.121-92.205.1.ppc64le", "product_id": "kernel-vanilla-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.121-92.205.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.205.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.121-92.205.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.205.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.205.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.205.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.205.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.205.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.205.1.ppc64le", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.205.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.205.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.205.1.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.205.1.s390x", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.205.1.s390x", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.205.1.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.205.1.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.205.1.s390x", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.205.1.s390x", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.205.1.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.205.1.s390x", "product_id": "dlm-kmp-default-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.205.1.s390x", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.205.1.s390x", "product_id": "dlm-kmp-vanilla-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.205.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.205.1.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.205.1.s390x", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.205.1.s390x", "product_id": "gfs2-kmp-vanilla-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.205.1.s390x", "product": { "name": "kernel-default-4.4.121-92.205.1.s390x", "product_id": "kernel-default-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.205.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.205.1.s390x", "product_id": "kernel-default-base-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.205.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.205.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.205.1.s390x", "product": { "name": "kernel-default-extra-4.4.121-92.205.1.s390x", "product_id": "kernel-default-extra-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.205.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.121-92.205.1.s390x", "product_id": "kernel-default-kgraft-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.205.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.205.1.s390x", "product_id": "kernel-default-man-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.205.1.s390x", "product": { "name": "kernel-obs-build-4.4.121-92.205.1.s390x", "product_id": "kernel-obs-build-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.205.1.s390x", "product": { "name": "kernel-obs-qa-4.4.121-92.205.1.s390x", "product_id": "kernel-obs-qa-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.205.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.205.1.s390x", "product_id": "kernel-syms-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.205.1.s390x", "product": { "name": "kernel-vanilla-4.4.121-92.205.1.s390x", "product_id": "kernel-vanilla-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.205.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.121-92.205.1.s390x", "product_id": "kernel-vanilla-base-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.205.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.121-92.205.1.s390x", "product_id": "kernel-vanilla-devel-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.121-92.205.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.121-92.205.1.s390x", "product_id": "kernel-zfcpdump-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.205.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.205.1.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.205.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.205.1.s390x", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.205.1.s390x", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.205.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.205.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.205.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.205.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.205.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.205.1.x86_64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.205.1.x86_64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.205.1.x86_64", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.205.1.x86_64", "product_id": "cluster-network-kmp-debug-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.205.1.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.205.1.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.205.1.x86_64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.205.1.x86_64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.205.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.121-92.205.1.x86_64", "product_id": "dlm-kmp-debug-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.205.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.205.1.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.205.1.x86_64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.205.1.x86_64", "product_id": "dlm-kmp-vanilla-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.205.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.121-92.205.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.205.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.205.1.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.205.1.x86_64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.205.1.x86_64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-debug-4.4.121-92.205.1.x86_64", "product_id": "kernel-debug-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-debug-base-4.4.121-92.205.1.x86_64", "product_id": "kernel-debug-base-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.121-92.205.1.x86_64", "product_id": "kernel-debug-devel-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.121-92.205.1.x86_64", "product_id": "kernel-debug-extra-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.121-92.205.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.205.1.x86_64", "product_id": "kernel-default-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.205.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.205.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-default-extra-4.4.121-92.205.1.x86_64", "product_id": "kernel-default-extra-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.121-92.205.1.x86_64", "product_id": "kernel-default-kgraft-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-obs-build-4.4.121-92.205.1.x86_64", "product_id": "kernel-obs-build-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.121-92.205.1.x86_64", "product_id": "kernel-obs-qa-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.205.1.x86_64", "product_id": "kernel-syms-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-vanilla-4.4.121-92.205.1.x86_64", "product_id": "kernel-vanilla-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.121-92.205.1.x86_64", "product_id": "kernel-vanilla-base-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.205.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.205.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.205.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.205.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.205.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.205.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.205.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.205.1.x86_64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.205.1.x86_64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.205.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.205.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.205.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.205.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.205.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.205.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.205.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.205.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.205.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.205.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.205.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.205.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.205.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.205.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.205.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2018-20784", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20784" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq\u0027s, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20784", "url": "https://www.suse.com/security/cve/CVE-2018-20784" }, { "category": "external", "summary": "SUSE Bug 1126703 for CVE-2018-20784", "url": "https://bugzilla.suse.com/1126703" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2018-20784" }, { "cve": "CVE-2022-3566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3566" } ], "notes": [ { "category": "general", "text": "A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3566", "url": "https://www.suse.com/security/cve/CVE-2022-3566" }, { "category": "external", "summary": "SUSE Bug 1204405 for CVE-2022-3566", "url": "https://bugzilla.suse.com/1204405" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2022-3566" }, { "cve": "CVE-2022-45884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45884" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45884", "url": "https://www.suse.com/security/cve/CVE-2022-45884" }, { "category": "external", "summary": "SUSE Bug 1205756 for CVE-2022-45884", "url": "https://bugzilla.suse.com/1205756" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45885" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45885", "url": "https://www.suse.com/security/cve/CVE-2022-45885" }, { "category": "external", "summary": "SUSE Bug 1205758 for CVE-2022-45885", "url": "https://bugzilla.suse.com/1205758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45886" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45886", "url": "https://www.suse.com/security/cve/CVE-2022-45886" }, { "category": "external", "summary": "SUSE Bug 1205760 for CVE-2022-45886", "url": "https://bugzilla.suse.com/1205760" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45887" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45887", "url": "https://www.suse.com/security/cve/CVE-2022-45887" }, { "category": "external", "summary": "SUSE Bug 1205762 for CVE-2022-45887", "url": "https://bugzilla.suse.com/1205762" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2022-45887", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45919" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45919", "url": "https://www.suse.com/security/cve/CVE-2022-45919" }, { "category": "external", "summary": "SUSE Bug 1205803 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1205803" }, { "category": "external", "summary": "SUSE Bug 1208600 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1208600" }, { "category": "external", "summary": "SUSE Bug 1208912 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1208912" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2022-45919" }, { "cve": "CVE-2023-0590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0590" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0590", "url": "https://www.suse.com/security/cve/CVE-2023-0590" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207795 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207795" }, { "category": "external", "summary": "SUSE Bug 1207822 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207822" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1211495" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-0590" }, { "cve": "CVE-2023-1077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1077" } ], "notes": [ { "category": "general", "text": "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1077", "url": "https://www.suse.com/security/cve/CVE-2023-1077" }, { "category": "external", "summary": "SUSE Bug 1208600 for CVE-2023-1077", "url": "https://bugzilla.suse.com/1208600" }, { "category": "external", "summary": "SUSE Bug 1208839 for CVE-2023-1077", "url": "https://bugzilla.suse.com/1208839" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-1077", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-1077", "url": "https://bugzilla.suse.com/1213842" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-1077" }, { "cve": "CVE-2023-1095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1095" } ], "notes": [ { "category": "general", "text": "In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1095", "url": "https://www.suse.com/security/cve/CVE-2023-1095" }, { "category": "external", "summary": "SUSE Bug 1208777 for CVE-2023-1095", "url": "https://bugzilla.suse.com/1208777" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1118" } ], "notes": [ { "category": "general", "text": "A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1118", "url": "https://www.suse.com/security/cve/CVE-2023-1118" }, { "category": "external", "summary": "SUSE Bug 1208837 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1208837" }, { "category": "external", "summary": "SUSE Bug 1208910 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1208910" }, { "category": "external", "summary": "SUSE Bug 1210423 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1210423" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1211495" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1213842" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1249", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1249" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 (\"coredump: Use the vma snapshot in fill_files_note\") not applied yet, then kernel could be affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1249", "url": "https://www.suse.com/security/cve/CVE-2023-1249" }, { "category": "external", "summary": "SUSE Bug 1209039 for CVE-2023-1249", "url": "https://bugzilla.suse.com/1209039" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-1249" }, { "cve": "CVE-2023-1380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1380" } ], "notes": [ { "category": "general", "text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-\u003ereq_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1380", "url": "https://www.suse.com/security/cve/CVE-2023-1380" }, { "category": "external", "summary": "SUSE Bug 1209287 for CVE-2023-1380", "url": "https://bugzilla.suse.com/1209287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1513" } ], "notes": [ { "category": "general", "text": "A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1513", "url": "https://www.suse.com/security/cve/CVE-2023-1513" }, { "category": "external", "summary": "SUSE Bug 1209532 for CVE-2023-1513", "url": "https://bugzilla.suse.com/1209532" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "low" } ], "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1611" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1611", "url": "https://www.suse.com/security/cve/CVE-2023-1611" }, { "category": "external", "summary": "SUSE Bug 1209687 for CVE-2023-1611", "url": "https://bugzilla.suse.com/1209687" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1670" } ], "notes": [ { "category": "general", "text": "A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1670", "url": "https://www.suse.com/security/cve/CVE-2023-1670" }, { "category": "external", "summary": "SUSE Bug 1209871 for CVE-2023-1670", "url": "https://bugzilla.suse.com/1209871" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-1670", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1989", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1989" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1989", "url": "https://www.suse.com/security/cve/CVE-2023-1989" }, { "category": "external", "summary": "SUSE Bug 1210336 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1210336" }, { "category": "external", "summary": "SUSE Bug 1210500 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1210500" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1214128" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1990" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1990", "url": "https://www.suse.com/security/cve/CVE-2023-1990" }, { "category": "external", "summary": "SUSE Bug 1210337 for CVE-2023-1990", "url": "https://bugzilla.suse.com/1210337" }, { "category": "external", "summary": "SUSE Bug 1210501 for CVE-2023-1990", "url": "https://bugzilla.suse.com/1210501" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-1990", "url": "https://bugzilla.suse.com/1214128" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1998" } ], "notes": [ { "category": "general", "text": "The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.\n\nThis happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1998", "url": "https://www.suse.com/security/cve/CVE-2023-1998" }, { "category": "external", "summary": "SUSE Bug 1210506 for CVE-2023-1998", "url": "https://bugzilla.suse.com/1210506" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-1998" }, { "cve": "CVE-2023-2124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2124" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2124", "url": "https://www.suse.com/security/cve/CVE-2023-2124" }, { "category": "external", "summary": "SUSE Bug 1210498 for CVE-2023-2124", "url": "https://bugzilla.suse.com/1210498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2162" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2162", "url": "https://www.suse.com/security/cve/CVE-2023-2162" }, { "category": "external", "summary": "SUSE Bug 1210647 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1210647" }, { "category": "external", "summary": "SUSE Bug 1210662 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1210662" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2194", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2194" } ], "notes": [ { "category": "general", "text": "An out-of-bounds write vulnerability was found in the Linux kernel\u0027s SLIMpro I2C device driver. The userspace \"data-\u003eblock[0]\" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2194", "url": "https://www.suse.com/security/cve/CVE-2023-2194" }, { "category": "external", "summary": "SUSE Bug 1210715 for CVE-2023-2194", "url": "https://bugzilla.suse.com/1210715" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-2194" }, { "cve": "CVE-2023-23454", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23454" } ], "notes": [ { "category": "general", "text": "cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23454", "url": "https://www.suse.com/security/cve/CVE-2023-23454" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207188 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1207188" }, { "category": "external", "summary": "SUSE Bug 1208030 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208030" }, { "category": "external", "summary": "SUSE Bug 1208044 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208044" }, { "category": "external", "summary": "SUSE Bug 1208085 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208085" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-2513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2513" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in the Linux kernel\u0027s ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2513", "url": "https://www.suse.com/security/cve/CVE-2023-2513" }, { "category": "external", "summary": "SUSE Bug 1211105 for CVE-2023-2513", "url": "https://bugzilla.suse.com/1211105" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-2513" }, { "cve": "CVE-2023-28328", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28328" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28328", "url": "https://www.suse.com/security/cve/CVE-2023-28328" }, { "category": "external", "summary": "SUSE Bug 1209291 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1209291" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28464" } ], "notes": [ { "category": "general", "text": "hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28464", "url": "https://www.suse.com/security/cve/CVE-2023-28464" }, { "category": "external", "summary": "SUSE Bug 1209052 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1209052" }, { "category": "external", "summary": "SUSE Bug 1211111 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1211111" }, { "category": "external", "summary": "SUSE Bug 1220130 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1220130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28772", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28772" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28772", "url": "https://www.suse.com/security/cve/CVE-2023-28772" }, { "category": "external", "summary": "SUSE Bug 1209549 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1209549" }, { "category": "external", "summary": "SUSE Bug 1211110 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1211110" }, { "category": "external", "summary": "SUSE Bug 1214378 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1214378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-28772" }, { "cve": "CVE-2023-30772", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-30772" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-30772", "url": "https://www.suse.com/security/cve/CVE-2023-30772" }, { "category": "external", "summary": "SUSE Bug 1210329 for CVE-2023-30772", "url": "https://bugzilla.suse.com/1210329" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-30772" }, { "cve": "CVE-2023-3090", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3090" } ], "notes": [ { "category": "general", "text": "A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.\n\nThe out-of-bounds write is caused by missing skb-\u003ecb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled.\n\n\nWe recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3090", "url": "https://www.suse.com/security/cve/CVE-2023-3090" }, { "category": "external", "summary": "SUSE Bug 1212842 for CVE-2023-3090", "url": "https://bugzilla.suse.com/1212842" }, { "category": "external", "summary": "SUSE Bug 1212849 for CVE-2023-3090", "url": "https://bugzilla.suse.com/1212849" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-3090", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1219701 for CVE-2023-3090", "url": "https://bugzilla.suse.com/1219701" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-3090" }, { "cve": "CVE-2023-3141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3141" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3141", "url": "https://www.suse.com/security/cve/CVE-2023-3141" }, { "category": "external", "summary": "SUSE Bug 1212129 for CVE-2023-3141", "url": "https://bugzilla.suse.com/1212129" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-3141", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-3141" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-31436" }, { "cve": "CVE-2023-3159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3159" } ], "notes": [ { "category": "general", "text": "A use after free issue was discovered in driver/firewire in outbound_phy_packet_callback in the Linux Kernel. In this flaw a local attacker with special privilege may cause a use after free problem when queue_event() fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3159", "url": "https://www.suse.com/security/cve/CVE-2023-3159" }, { "category": "external", "summary": "SUSE Bug 1208600 for CVE-2023-3159", "url": "https://bugzilla.suse.com/1208600" }, { "category": "external", "summary": "SUSE Bug 1212128 for CVE-2023-3159", "url": "https://bugzilla.suse.com/1212128" }, { "category": "external", "summary": "SUSE Bug 1212347 for CVE-2023-3159", "url": "https://bugzilla.suse.com/1212347" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-3159", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-3159", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-3159", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "important" } ], "title": "CVE-2023-3159" }, { "cve": "CVE-2023-3161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3161" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing font-\u003ewidth and font-\u003eheight greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3161", "url": "https://www.suse.com/security/cve/CVE-2023-3161" }, { "category": "external", "summary": "SUSE Bug 1212154 for CVE-2023-3161", "url": "https://bugzilla.suse.com/1212154" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-3161", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-3161" }, { "cve": "CVE-2023-32269", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-32269" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c, there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However, in order for an attacker to exploit this, the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-32269", "url": "https://www.suse.com/security/cve/CVE-2023-32269" }, { "category": "external", "summary": "SUSE Bug 1211186 for CVE-2023-32269", "url": "https://bugzilla.suse.com/1211186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-32269" }, { "cve": "CVE-2023-35824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-35824" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/media/pci/dm1105/dm1105.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-35824", "url": "https://www.suse.com/security/cve/CVE-2023-35824" }, { "category": "external", "summary": "SUSE Bug 1212501 for CVE-2023-35824", "url": "https://bugzilla.suse.com/1212501" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-35824", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.205.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.205.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.205.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-11T04:31:55Z", "details": "moderate" } ], "title": "CVE-2023-35824" } ] }
suse-su-2023:1894-1
Vulnerability from csaf_suse
Published
2023-04-18 09:36
Modified
2023-04-18 09:36
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).
- CVE-2020-36691: Fixed an issue which could allow attackers to cause a denial of service via a nested Netlink policy with a back reference (bsc#1209613).
- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).
- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue led by a type confusion (bsc#1207125).
- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).
- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).
- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).
- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).
- CVE-2022-20567: Fixed use after free that could lead to a local privilege escalation in pppol2tp_create of l2tp_ppp.c (bsc#1208850).
- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).
- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).
The following non-security bugs were fixed:
- applicom: Fix PCI device refcount leak in applicom_init() (git-fixes).
- ARM: 8702/1: head-common.S: Clear lr before jumping to start_kernel() (git-fixes)
- arm64: cmpxchg_double*: hazard against entire exchange variable (git-fixes)
- arm64: cpu_ops: fix a leaked reference by adding missing of_node_put (git-fixes)
- arm64: Discard .note.GNU-stack section (bsc#1203693 bsc#1209798).
- arm64: Do not forget syscall when starting a new thread. (git-fixes)
- arm64: Fix compiler warning from pte_unmap() with (git-fixes)
- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes)
- arm64: kaslr: Reserve size of ARM64_MEMSTART_ALIGN in linear region (git-fixes)
- arm64: kprobe: make page to RO mode when allocate it (git-fixes)
- arm64: kpti: ensure patched kernel text is fetched from PoU (git-fixes)
- arm64: Mark __stack_chk_guard as __ro_after_init (git-fixes)
- arm64: psci: Avoid printing in cpu_psci_cpu_die() (git-fixes)
- arm64: psci: Reduce the waiting time for cpu_psci_cpu_kill() (git-fixes)
- arm64: unwind: Prohibit probing on return_address() (git-fixes)
- arm64: Use test_tsk_thread_flag() for checking TIF_SINGLESTEP (git-fixes)
- arm64/alternatives: do not patch up internal branches (git-fixes)
- arm64/alternatives: move length validation inside the subsection (git-fixes)
- arm64/alternatives: use subsections for replacement sequences (git-fixes)
- arm64/cpufeature: Fix field sign for DIT hwcap detection (git-fixes)
- arm64/mm: fix variable 'pud' set but not used (git-fixes)
- arm64/mm: return cpu_all_mask when node is NUMA_NO_NODE (git-fixes)
- arm64/vdso: Discard .note.gnu.property sections in vDSO (git-fixes)
- Bluetooth: btusb: Add VID:PID 13d3:3529 for Realtek RTL8821CE (git-fixes).
- Bluetooth: btusb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- crypto: arm64 - Fix unused variable compilation warnings of (git-fixes)
- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).
- ftrace: Fix invalid address access in lookup_rec() when index is 0 (git-fixes).
- ima: Fix function name error in comment (git-fixes).
- Input: atmel_mxt_ts - fix double free in mxt_read_info_block (git-fixes).
- ipv4: route: fix inet_rtm_getroute induced crash (git-fixes).
- kabi: PCI: endpoint: Fix for concurrent memory allocation in OB address region (git-fixes).
- kfifo: fix ternary sign extension bugs (git-fixes).
- kgdb: Drop malformed kernel doc comment (git-fixes).
- KVM: arm64: Hide system instruction access to Trace registers (git-fixes)
- net: usb: lan78xx: Limit packet length to skb->len (git-fixes).
- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).
- net: usb: smsc75xx: Limit packet length to skb->len (git-fixes).
- net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull (git-fixes).
- net: usb: smsc95xx: Limit packet length to skb->len (git-fixes).
- NFSv4: Fix hangs when recovering open state after a server reboot (git-fixes).
- ntp: Limit TAI-UTC offset (git-fixes)
- PCI: aardvark: Do not blindly enable ASPM L0s and do not write to read-only register (git-fixes).
- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).
- PCI: aardvark: Do not touch PCIe registers if no card connected (git-fixes).
- PCI: aardvark: Fix a leaked reference by adding missing of_node_put() (git-fixes).
- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).
- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).
- PCI: aardvark: Improve link training (git-fixes).
- PCI: aardvark: Indicate error in 'val' when config read fails (git-fixes).
- PCI: aardvark: Introduce an advk_pcie_valid_device() helper (git-fixes).
- PCI: aardvark: Remove PCIe outbound window configuration (git-fixes).
- PCI: aardvark: Train link immediately after enabling training (git-fixes).
- PCI: aardvark: Wait for endpoint to be ready before training link (git-fixes).
- PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints (git-fixes).
- PCI: Add ACS quirk for iProc PAXB (git-fixes).
- PCI: Avoid FLR for AMD Matisse HD Audio & USB 3.0 (git-fixes).
- PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).
- PCI: endpoint: Cast the page number to phys_addr_t (git-fixes).
- PCI: endpoint: Fix for concurrent memory allocation in OB address region (git-fixes).
- PCI: hv: Add a per-bus mutex state_lock (bsc#1207001).
- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1207001).
- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207001).
- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207001).
- PCI: Make ACS quirk implementations more uniform (git-fixes).
- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).
- PCI: PM: Avoid skipping bus-level PM on platforms without ACPI (git-fixes).
- PCI: qcom: Use PHY_REFCLK_USE_PAD only for ipq8064 (git-fixes).
- PCI: tegra: Fix OF node reference leak (git-fixes).
- PCI: Unify ACS quirk desired vs provided checking (git-fixes).
- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).
- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).
- PCI/MSI: Enforce MSI entry updates to be visible (git-fixes).
- PCI/MSI: Enforce that MSI-X table entry is masked for update (git-fixes).
- PCI/MSI: Mask all unused MSI-X entries (git-fixes).
- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).
- PCI/PM: Always return devices to D0 when thawing (git-fixes).
- PCI/PM: Avoid using device_may_wakeup() for runtime PM (git-fixes).
- PM: hibernate: flush swap writer after marking (git-fixes).
- powerpc/btext: add missing of_node_put (bsc#1065729).
- powerpc/powernv/ioda: Skip unallocated resources when mapping to PE (bsc#1065729).
- powerpc/pseries/lpar: add missing RTAS retry status handling (bsc#1109158 ltc#169177 git-fixes).
- powerpc/pseries/lparcfg: add missing RTAS retry status handling (bsc#1065729).
- powerpc/rtas: ensure 4KB alignment for rtas_data_buf (bsc#1065729).
- powerpc/xics: fix refcount leak in icp_opal_init() (bsc#1065729).
- ppc64le: HWPOISON_INJECT=m (bsc#1209572).
- ring-buffer: remove obsolete comment for free_buffer_page() (git-fixes).
- s390/vfio-ap: fix memory leak in vfio_ap device driver (git-fixes).
- sbitmap: Avoid lockups when waker gets preempted (bsc#1209118).
- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1199837).
- scsi: qla2xxx: Synchronize the IOCB count to be in order (bsc#1209292 bsc#1209684 bsc#1209556).
- SUNRPC: Fix a server shutdown leak (git-fixes).
- timekeeping: Prevent 32bit truncation in (git-fixes)
- timers: Clear timer_base::must_forward_clk with (bsc#1207890)
- timers/sched_clock: Prevent generic sched_clock wrap caused by tick_freeze() (git-fixes).
- tracing: Add NULL checks for buffer in ring_buffer_free_read_page() (git-fixes).
- tracing/hwlat: Replace sched_setaffinity with set_cpus_allowed_ptr (git-fixes).
- uprobes/x86: Fix detection of 32-bit user mode (git-fixes).
- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).
- usb: dwc3: exynos: Fix remove() function (git-fixes).
- usb: dwc3: gadget: Stop processing more requests on IMI (git-fixes).
- usb: misc: iowarrior: fix up header size for USB_DEVICE_ID_CODEMERCS_IOW100 (git-fixes).
- usb: typec: altmodes/displayport: Fix probe pin assign check (git-fixes).
- x86, boot: Remove multiple copy of static function sanitize_boot_params() (git-fixes).
- x86/apic: Add name to irq chip (bsc#1206010).
- x86/apic: Deinline x2apic functions (bsc#1181001 jsc#ECO-3191).
- x86/apic: Fix arch_dynirq_lower_bound() bug for DT enabled machines (git-fixes).
- x86/apic: Handle missing global clockevent gracefully (git-fixes bsc#1142926).
- x86/apic: Soft disable APIC before initializing it (git-fixes).
- x86/atomic: Fix smp_mb__{before,after}_atomic() (git-fixes).
- x86/build: Add 'set -e' to mkcapflags.sh to delete broken capflags.c (git-fixes).
- x86/decoder: Add TEST opcode to Group3-2 (git-fixes).
- x86/ia32: Fix ia32_restore_sigcontext() AC leak (git-fixes).
- x86/ioapic: Force affinity setup before startup (bsc#1193231).
- x86/ioapic: Prevent inconsistent state when moving an interrupt (git-fixes).
- x86/irq/64: Limit IST stack overflow check to #DB stack (git-fixes).
- x86/lib/cpu: Address missing prototypes warning (git-fixes).
- x86/mce: Lower throttling MCE messages' priority to warning (git-fixes).
- x86/mm: Remove in_nmi() warning from 64-bit implementation of vmalloc_fault() (git-fixes).
- x86/mm: Use the correct function type for native_set_fixmap() (git-fixes).
- x86/paravirt: Fix callee-saved function ELF sizes (git-fixes).
- x86/PCI: Fix PCI IRQ routing table memory leak (git-fixes).
- x86/power: Fix 'nosmt' vs hibernation triple fault during resume (git-fixes).
- x86/reboot: Always use NMI fallback when shutdown via reboot vector IPI fails (git-fixes).
- x86/stacktrace: Prevent infinite loop in arch_stack_walk_user() (git-fixes).
- x86/sysfb: Fix check for bad VRAM size (git-fixes).
- x86/uaccess, signal: Fix AC=1 bloat (git-fixes).
- x86/x2apic: Mark set_x2apic_phys_mode() as __init (bsc#1181001 jsc#ECO-3191).
- x86/xen: Fix memory leak in xen_init_lock_cpu() (git-fixes).
- x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() (git-fixes).
- xen/netfront: enable device after manual module load (git-fixes).
- xen/netfront: Fix mismatched rtnl_unlock (git-fixes).
- xen/netfront: Fix NULL sring after live migration (git-fixes).
- xen/netfront: fix potential deadlock in xennet_remove() (git-fixes).
- xen/netfront: Fix race between device setup and open (git-fixes).
- xen/netfront: Update features after registering netdev (git-fixes).
- xen/netfront: wait xenbus state change when load module manually (git-fixes).
- xen/netfront: fix waiting for xenbus state change (git-fixes).
- xen/netfront: stop tx queues during live migration (git-fixes).
- xen/platform-pci: add missing free_irq() in error path (git-fixes).
Patchnames
SUSE-2023-1894,SUSE-SLE-RT-12-SP5-2023-1894
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).\n- CVE-2020-36691: Fixed an issue which could allow attackers to cause a denial of service via a nested Netlink policy with a back reference (bsc#1209613).\n- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).\n- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).\n- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).\n- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue led by a type confusion (bsc#1207125).\n- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).\n- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).\n- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256). \n- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).\n- CVE-2022-20567: Fixed use after free that could lead to a local privilege escalation in pppol2tp_create of l2tp_ppp.c (bsc#1208850).\n- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).\n- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).\n\nThe following non-security bugs were fixed:\n\n- applicom: Fix PCI device refcount leak in applicom_init() (git-fixes).\n- ARM: 8702/1: head-common.S: Clear lr before jumping to start_kernel() (git-fixes)\n- arm64: cmpxchg_double*: hazard against entire exchange variable (git-fixes)\n- arm64: cpu_ops: fix a leaked reference by adding missing of_node_put (git-fixes)\n- arm64: Discard .note.GNU-stack section (bsc#1203693 bsc#1209798).\n- arm64: Do not forget syscall when starting a new thread. (git-fixes)\n- arm64: Fix compiler warning from pte_unmap() with (git-fixes)\n- arm64: fix oops in concurrently setting insn_emulation sysctls (git-fixes)\n- arm64: kaslr: Reserve size of ARM64_MEMSTART_ALIGN in linear region (git-fixes)\n- arm64: kprobe: make page to RO mode when allocate it (git-fixes)\n- arm64: kpti: ensure patched kernel text is fetched from PoU (git-fixes)\n- arm64: Mark __stack_chk_guard as __ro_after_init (git-fixes)\n- arm64: psci: Avoid printing in cpu_psci_cpu_die() (git-fixes)\n- arm64: psci: Reduce the waiting time for cpu_psci_cpu_kill() (git-fixes)\n- arm64: unwind: Prohibit probing on return_address() (git-fixes)\n- arm64: Use test_tsk_thread_flag() for checking TIF_SINGLESTEP (git-fixes)\n- arm64/alternatives: do not patch up internal branches (git-fixes)\n- arm64/alternatives: move length validation inside the subsection (git-fixes)\n- arm64/alternatives: use subsections for replacement sequences (git-fixes)\n- arm64/cpufeature: Fix field sign for DIT hwcap detection (git-fixes)\n- arm64/mm: fix variable \u0027pud\u0027 set but not used (git-fixes)\n- arm64/mm: return cpu_all_mask when node is NUMA_NO_NODE (git-fixes)\n- arm64/vdso: Discard .note.gnu.property sections in vDSO (git-fixes)\n- Bluetooth: btusb: Add VID:PID 13d3:3529 for Realtek RTL8821CE (git-fixes).\n- Bluetooth: btusb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).\n- crypto: arm64 - Fix unused variable compilation warnings of (git-fixes)\n- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).\n- ftrace: Fix invalid address access in lookup_rec() when index is 0 (git-fixes).\n- ima: Fix function name error in comment (git-fixes).\n- Input: atmel_mxt_ts - fix double free in mxt_read_info_block (git-fixes).\n- ipv4: route: fix inet_rtm_getroute induced crash (git-fixes).\n- kabi: PCI: endpoint: Fix for concurrent memory allocation in OB address region (git-fixes).\n- kfifo: fix ternary sign extension bugs (git-fixes).\n- kgdb: Drop malformed kernel doc comment (git-fixes).\n- KVM: arm64: Hide system instruction access to Trace registers (git-fixes)\n- net: usb: lan78xx: Limit packet length to skb-\u003elen (git-fixes).\n- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).\n- net: usb: smsc75xx: Limit packet length to skb-\u003elen (git-fixes).\n- net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull (git-fixes).\n- net: usb: smsc95xx: Limit packet length to skb-\u003elen (git-fixes).\n- NFSv4: Fix hangs when recovering open state after a server reboot (git-fixes).\n- ntp: Limit TAI-UTC offset (git-fixes)\n- PCI: aardvark: Do not blindly enable ASPM L0s and do not write to read-only register (git-fixes).\n- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).\n- PCI: aardvark: Do not touch PCIe registers if no card connected (git-fixes).\n- PCI: aardvark: Fix a leaked reference by adding missing of_node_put() (git-fixes).\n- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).\n- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).\n- PCI: aardvark: Improve link training (git-fixes).\n- PCI: aardvark: Indicate error in \u0027val\u0027 when config read fails (git-fixes).\n- PCI: aardvark: Introduce an advk_pcie_valid_device() helper (git-fixes).\n- PCI: aardvark: Remove PCIe outbound window configuration (git-fixes).\n- PCI: aardvark: Train link immediately after enabling training (git-fixes).\n- PCI: aardvark: Wait for endpoint to be ready before training link (git-fixes).\n- PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints (git-fixes).\n- PCI: Add ACS quirk for iProc PAXB (git-fixes).\n- PCI: Avoid FLR for AMD Matisse HD Audio \u0026 USB 3.0 (git-fixes).\n- PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).\n- PCI: endpoint: Cast the page number to phys_addr_t (git-fixes).\n- PCI: endpoint: Fix for concurrent memory allocation in OB address region (git-fixes).\n- PCI: hv: Add a per-bus mutex state_lock (bsc#1207001).\n- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1207001).\n- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207001).\n- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207001).\n- PCI: Make ACS quirk implementations more uniform (git-fixes).\n- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).\n- PCI: PM: Avoid skipping bus-level PM on platforms without ACPI (git-fixes).\n- PCI: qcom: Use PHY_REFCLK_USE_PAD only for ipq8064 (git-fixes).\n- PCI: tegra: Fix OF node reference leak (git-fixes).\n- PCI: Unify ACS quirk desired vs provided checking (git-fixes).\n- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).\n- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).\n- PCI/MSI: Enforce MSI entry updates to be visible (git-fixes).\n- PCI/MSI: Enforce that MSI-X table entry is masked for update (git-fixes).\n- PCI/MSI: Mask all unused MSI-X entries (git-fixes).\n- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).\n- PCI/PM: Always return devices to D0 when thawing (git-fixes).\n- PCI/PM: Avoid using device_may_wakeup() for runtime PM (git-fixes).\n- PM: hibernate: flush swap writer after marking (git-fixes).\n- powerpc/btext: add missing of_node_put (bsc#1065729).\n- powerpc/powernv/ioda: Skip unallocated resources when mapping to PE (bsc#1065729).\n- powerpc/pseries/lpar: add missing RTAS retry status handling (bsc#1109158 ltc#169177 git-fixes).\n- powerpc/pseries/lparcfg: add missing RTAS retry status handling (bsc#1065729).\n- powerpc/rtas: ensure 4KB alignment for rtas_data_buf (bsc#1065729).\n- powerpc/xics: fix refcount leak in icp_opal_init() (bsc#1065729).\n- ppc64le: HWPOISON_INJECT=m (bsc#1209572).\n- ring-buffer: remove obsolete comment for free_buffer_page() (git-fixes).\n- s390/vfio-ap: fix memory leak in vfio_ap device driver (git-fixes).\n- sbitmap: Avoid lockups when waker gets preempted (bsc#1209118).\n- scsi: lpfc: Return DID_TRANSPORT_DISRUPTED instead of DID_REQUEUE (bsc#1199837).\n- scsi: qla2xxx: Synchronize the IOCB count to be in order (bsc#1209292 bsc#1209684 bsc#1209556).\n- SUNRPC: Fix a server shutdown leak (git-fixes).\n- timekeeping: Prevent 32bit truncation in (git-fixes)\n- timers: Clear timer_base::must_forward_clk with (bsc#1207890)\n- timers/sched_clock: Prevent generic sched_clock wrap caused by tick_freeze() (git-fixes).\n- tracing: Add NULL checks for buffer in ring_buffer_free_read_page() (git-fixes).\n- tracing/hwlat: Replace sched_setaffinity with set_cpus_allowed_ptr (git-fixes).\n- uprobes/x86: Fix detection of 32-bit user mode (git-fixes).\n- usb: chipidea: fix deadlock in ci_otg_del_timer (git-fixes).\n- usb: dwc3: exynos: Fix remove() function (git-fixes).\n- usb: dwc3: gadget: Stop processing more requests on IMI (git-fixes).\n- usb: misc: iowarrior: fix up header size for USB_DEVICE_ID_CODEMERCS_IOW100 (git-fixes).\n- usb: typec: altmodes/displayport: Fix probe pin assign check (git-fixes).\n- x86, boot: Remove multiple copy of static function sanitize_boot_params() (git-fixes).\n- x86/apic: Add name to irq chip (bsc#1206010).\n- x86/apic: Deinline x2apic functions (bsc#1181001 jsc#ECO-3191).\n- x86/apic: Fix arch_dynirq_lower_bound() bug for DT enabled machines (git-fixes).\n- x86/apic: Handle missing global clockevent gracefully (git-fixes bsc#1142926).\n- x86/apic: Soft disable APIC before initializing it (git-fixes).\n- x86/atomic: Fix smp_mb__{before,after}_atomic() (git-fixes).\n- x86/build: Add \u0027set -e\u0027 to mkcapflags.sh to delete broken capflags.c (git-fixes).\n- x86/decoder: Add TEST opcode to Group3-2 (git-fixes).\n- x86/ia32: Fix ia32_restore_sigcontext() AC leak (git-fixes).\n- x86/ioapic: Force affinity setup before startup (bsc#1193231).\n- x86/ioapic: Prevent inconsistent state when moving an interrupt (git-fixes).\n- x86/irq/64: Limit IST stack overflow check to #DB stack (git-fixes).\n- x86/lib/cpu: Address missing prototypes warning (git-fixes).\n- x86/mce: Lower throttling MCE messages\u0027 priority to warning (git-fixes).\n- x86/mm: Remove in_nmi() warning from 64-bit implementation of vmalloc_fault() (git-fixes).\n- x86/mm: Use the correct function type for native_set_fixmap() (git-fixes).\n- x86/paravirt: Fix callee-saved function ELF sizes (git-fixes).\n- x86/PCI: Fix PCI IRQ routing table memory leak (git-fixes).\n- x86/power: Fix \u0027nosmt\u0027 vs hibernation triple fault during resume (git-fixes).\n- x86/reboot: Always use NMI fallback when shutdown via reboot vector IPI fails (git-fixes).\n- x86/stacktrace: Prevent infinite loop in arch_stack_walk_user() (git-fixes).\n- x86/sysfb: Fix check for bad VRAM size (git-fixes).\n- x86/uaccess, signal: Fix AC=1 bloat (git-fixes).\n- x86/x2apic: Mark set_x2apic_phys_mode() as __init (bsc#1181001 jsc#ECO-3191).\n- x86/xen: Fix memory leak in xen_init_lock_cpu() (git-fixes).\n- x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() (git-fixes).\n- xen/netfront: enable device after manual module load (git-fixes).\n- xen/netfront: Fix mismatched rtnl_unlock (git-fixes).\n- xen/netfront: Fix NULL sring after live migration (git-fixes).\n- xen/netfront: fix potential deadlock in xennet_remove() (git-fixes).\n- xen/netfront: Fix race between device setup and open (git-fixes).\n- xen/netfront: Update features after registering netdev (git-fixes).\n- xen/netfront: wait xenbus state change when load module manually (git-fixes).\n- xen/netfront: fix waiting for xenbus state change (git-fixes).\n- xen/netfront: stop tx queues during live migration (git-fixes).\n- xen/platform-pci: add missing free_irq() in error path (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-1894,SUSE-SLE-RT-12-SP5-2023-1894", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_1894-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:1894-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20231894-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:1894-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1109158", "url": "https://bugzilla.suse.com/1109158" }, { "category": "self", "summary": "SUSE Bug 1142926", "url": "https://bugzilla.suse.com/1142926" }, { "category": "self", "summary": "SUSE Bug 1181001", "url": "https://bugzilla.suse.com/1181001" }, { "category": "self", "summary": "SUSE Bug 1193231", "url": "https://bugzilla.suse.com/1193231" }, { "category": "self", "summary": "SUSE Bug 1199837", "url": "https://bugzilla.suse.com/1199837" }, { "category": "self", "summary": "SUSE Bug 1203693", "url": "https://bugzilla.suse.com/1203693" }, { "category": "self", "summary": "SUSE Bug 1206010", "url": "https://bugzilla.suse.com/1206010" }, { "category": "self", "summary": "SUSE Bug 1207001", "url": "https://bugzilla.suse.com/1207001" }, { "category": "self", "summary": "SUSE Bug 1207125", "url": "https://bugzilla.suse.com/1207125" }, { "category": "self", "summary": "SUSE Bug 1207890", "url": "https://bugzilla.suse.com/1207890" }, { "category": "self", "summary": "SUSE Bug 1208048", "url": "https://bugzilla.suse.com/1208048" }, { "category": "self", "summary": "SUSE Bug 1208599", "url": "https://bugzilla.suse.com/1208599" }, { "category": "self", "summary": "SUSE Bug 1208777", "url": "https://bugzilla.suse.com/1208777" }, { "category": "self", "summary": "SUSE Bug 1208850", "url": "https://bugzilla.suse.com/1208850" }, { "category": "self", "summary": "SUSE Bug 1209052", "url": "https://bugzilla.suse.com/1209052" }, { "category": "self", "summary": "SUSE Bug 1209118", "url": "https://bugzilla.suse.com/1209118" }, { "category": "self", "summary": "SUSE Bug 1209126", "url": "https://bugzilla.suse.com/1209126" }, { "category": "self", "summary": "SUSE Bug 1209256", "url": "https://bugzilla.suse.com/1209256" }, { "category": "self", "summary": "SUSE Bug 1209289", "url": "https://bugzilla.suse.com/1209289" }, { "category": "self", "summary": "SUSE Bug 1209291", "url": "https://bugzilla.suse.com/1209291" }, { "category": "self", "summary": "SUSE Bug 1209292", "url": "https://bugzilla.suse.com/1209292" }, { "category": "self", "summary": "SUSE Bug 1209532", "url": "https://bugzilla.suse.com/1209532" }, { "category": "self", "summary": "SUSE Bug 1209547", "url": "https://bugzilla.suse.com/1209547" }, { "category": "self", "summary": "SUSE Bug 1209549", "url": "https://bugzilla.suse.com/1209549" }, { "category": "self", "summary": "SUSE Bug 1209556", "url": "https://bugzilla.suse.com/1209556" }, { "category": "self", "summary": "SUSE Bug 1209572", "url": "https://bugzilla.suse.com/1209572" }, { "category": "self", "summary": "SUSE Bug 1209613", "url": "https://bugzilla.suse.com/1209613" }, { "category": "self", "summary": "SUSE Bug 1209634", "url": "https://bugzilla.suse.com/1209634" }, { "category": "self", "summary": "SUSE Bug 1209684", "url": "https://bugzilla.suse.com/1209684" }, { "category": "self", "summary": "SUSE Bug 1209687", "url": "https://bugzilla.suse.com/1209687" }, { "category": "self", "summary": "SUSE Bug 1209777", "url": "https://bugzilla.suse.com/1209777" }, { "category": "self", "summary": "SUSE Bug 1209778", "url": "https://bugzilla.suse.com/1209778" }, { "category": "self", "summary": "SUSE Bug 1209798", "url": "https://bugzilla.suse.com/1209798" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36691 page", "url": "https://www.suse.com/security/cve/CVE-2020-36691/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3923 page", "url": "https://www.suse.com/security/cve/CVE-2021-3923/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20567 page", "url": "https://www.suse.com/security/cve/CVE-2022-20567/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1076 page", "url": "https://www.suse.com/security/cve/CVE-2023-1076/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1095 page", "url": "https://www.suse.com/security/cve/CVE-2023-1095/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1281 page", "url": "https://www.suse.com/security/cve/CVE-2023-1281/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1513 page", "url": "https://www.suse.com/security/cve/CVE-2023-1513/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1611 page", "url": "https://www.suse.com/security/cve/CVE-2023-1611/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28328 page", "url": "https://www.suse.com/security/cve/CVE-2023-28328/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28464 page", "url": "https://www.suse.com/security/cve/CVE-2023-28464/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28772 page", "url": "https://www.suse.com/security/cve/CVE-2023-28772/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2023-04-18T09:36:06Z", "generator": { "date": "2023-04-18T09:36:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:1894-1", "initial_release_date": "2023-04-18T09:36:06Z", "revision_history": [ { "date": "2023-04-18T09:36:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-10.121.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-10.121.1.noarch", "product_id": "kernel-devel-rt-4.12.14-10.121.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-10.121.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-10.121.1.noarch", "product_id": "kernel-source-rt-4.12.14-10.121.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-4.12.14-10.121.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-4.12.14-10.121.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-10.121.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-10.121.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-4.12.14-10.121.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-4.12.14-10.121.1.x86_64", "product_id": "dlm-kmp-rt_debug-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-4.12.14-10.121.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-4.12.14-10.121.1.x86_64", "product_id": "gfs2-kmp-rt_debug-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-10.121.1.x86_64", "product": { "name": "kernel-rt-4.12.14-10.121.1.x86_64", "product_id": "kernel-rt-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-10.121.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-10.121.1.x86_64", "product_id": "kernel-rt-base-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-10.121.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-10.121.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-4.12.14-10.121.1.x86_64", "product": { "name": "kernel-rt-extra-4.12.14-10.121.1.x86_64", "product_id": "kernel-rt-extra-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-kgraft-devel-4.12.14-10.121.1.x86_64", "product": { "name": "kernel-rt-kgraft-devel-4.12.14-10.121.1.x86_64", "product_id": "kernel-rt-kgraft-devel-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-10.121.1.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-10.121.1.x86_64", "product_id": "kernel-rt_debug-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-base-4.12.14-10.121.1.x86_64", "product": { "name": "kernel-rt_debug-base-4.12.14-10.121.1.x86_64", "product_id": "kernel-rt_debug-base-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-4.12.14-10.121.1.x86_64", "product": { "name": "kernel-rt_debug-extra-4.12.14-10.121.1.x86_64", "product_id": "kernel-rt_debug-extra-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-kgraft-devel-4.12.14-10.121.1.x86_64", "product": { "name": "kernel-rt_debug-kgraft-devel-4.12.14-10.121.1.x86_64", "product_id": "kernel-rt_debug-kgraft-devel-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-10.121.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-10.121.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-4.12.14-10.121.1.x86_64", "product": { "name": "kselftests-kmp-rt-4.12.14-10.121.1.x86_64", "product_id": "kselftests-kmp-rt-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-4.12.14-10.121.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-4.12.14-10.121.1.x86_64", "product_id": "kselftests-kmp-rt_debug-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-10.121.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-10.121.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-4.12.14-10.121.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-4.12.14-10.121.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-4.12.14-10.121.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP5", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-10.121.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-10.121.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-10.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-10.121.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-10.121.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-10.121.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-10.121.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-10.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-10.121.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-10.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-10.121.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-10.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-4.12.14-10.121.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64" }, "product_reference": "kernel-rt_debug-4.12.14-10.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-10.121.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-10.121.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-10.121.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-10.121.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-10.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-10.121.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-10.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-18T09:36:06Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2020-36691", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36691" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.8. lib/nlattr.c allows attackers to cause a denial of service (unbounded recursion) via a nested Netlink policy with a back reference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36691", "url": "https://www.suse.com/security/cve/CVE-2020-36691" }, { "category": "external", "summary": "SUSE Bug 1209613 for CVE-2020-36691", "url": "https://bugzilla.suse.com/1209613" }, { "category": "external", "summary": "SUSE Bug 1209777 for CVE-2020-36691", "url": "https://bugzilla.suse.com/1209777" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-18T09:36:06Z", "details": "moderate" } ], "title": "CVE-2020-36691" }, { "cve": "CVE-2021-3923", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3923" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3923", "url": "https://www.suse.com/security/cve/CVE-2021-3923" }, { "category": "external", "summary": "SUSE Bug 1209778 for CVE-2021-3923", "url": "https://bugzilla.suse.com/1209778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-18T09:36:06Z", "details": "low" } ], "title": "CVE-2021-3923" }, { "cve": "CVE-2022-20567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20567" } ], "notes": [ { "category": "general", "text": "In pppol2tp_create of l2tp_ppp.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-186777253References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20567", "url": "https://www.suse.com/security/cve/CVE-2022-20567" }, { "category": "external", "summary": "SUSE Bug 1208850 for CVE-2022-20567", "url": "https://bugzilla.suse.com/1208850" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-18T09:36:06Z", "details": "moderate" } ], "title": "CVE-2022-20567" }, { "cve": "CVE-2023-1076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1076" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1076", "url": "https://www.suse.com/security/cve/CVE-2023-1076" }, { "category": "external", "summary": "SUSE Bug 1208599 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1208599" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-18T09:36:06Z", "details": "moderate" } ], "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1095" } ], "notes": [ { "category": "general", "text": "In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1095", "url": "https://www.suse.com/security/cve/CVE-2023-1095" }, { "category": "external", "summary": "SUSE Bug 1208777 for CVE-2023-1095", "url": "https://bugzilla.suse.com/1208777" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-18T09:36:06Z", "details": "moderate" } ], "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1281" } ], "notes": [ { "category": "general", "text": "Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when \u0027tcf_exts_exec()\u0027 is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root.\nThis issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1281", "url": "https://www.suse.com/security/cve/CVE-2023-1281" }, { "category": "external", "summary": "SUSE Bug 1209634 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1209634" }, { "category": "external", "summary": "SUSE Bug 1209683 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1209683" }, { "category": "external", "summary": "SUSE Bug 1210335 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1210335" }, { "category": "external", "summary": "SUSE Bug 1210423 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1210423" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-18T09:36:06Z", "details": "important" } ], "title": "CVE-2023-1281" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-18T09:36:06Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1513" } ], "notes": [ { "category": "general", "text": "A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1513", "url": "https://www.suse.com/security/cve/CVE-2023-1513" }, { "category": "external", "summary": "SUSE Bug 1209532 for CVE-2023-1513", "url": "https://bugzilla.suse.com/1209532" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-18T09:36:06Z", "details": "low" } ], "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1611" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1611", "url": "https://www.suse.com/security/cve/CVE-2023-1611" }, { "category": "external", "summary": "SUSE Bug 1209687 for CVE-2023-1611", "url": "https://bugzilla.suse.com/1209687" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-18T09:36:06Z", "details": "moderate" } ], "title": "CVE-2023-1611" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-18T09:36:06Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-28328", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28328" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28328", "url": "https://www.suse.com/security/cve/CVE-2023-28328" }, { "category": "external", "summary": "SUSE Bug 1209291 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1209291" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-18T09:36:06Z", "details": "moderate" } ], "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28464" } ], "notes": [ { "category": "general", "text": "hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28464", "url": "https://www.suse.com/security/cve/CVE-2023-28464" }, { "category": "external", "summary": "SUSE Bug 1209052 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1209052" }, { "category": "external", "summary": "SUSE Bug 1211111 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1211111" }, { "category": "external", "summary": "SUSE Bug 1220130 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1220130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-18T09:36:06Z", "details": "important" } ], "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28772", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28772" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28772", "url": "https://www.suse.com/security/cve/CVE-2023-28772" }, { "category": "external", "summary": "SUSE Bug 1209549 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1209549" }, { "category": "external", "summary": "SUSE Bug 1211110 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1211110" }, { "category": "external", "summary": "SUSE Bug 1214378 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1214378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.121.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.121.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.121.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-04-18T09:36:06Z", "details": "important" } ], "title": "CVE-2023-28772" } ] }
suse-su-2023:2689-1
Vulnerability from csaf_suse
Published
2023-06-28 14:07
Modified
2023-06-28 14:07
Summary
Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP5)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP5)
Description of the patch
This update for the Linux Kernel 4.12.14-122_153 fixes several issues.
The following security issues were fixed:
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).
Patchnames
SUSE-2023-2689,SUSE-SLE-Live-Patching-12-SP5-2023-2689
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP5)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-122_153 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2689,SUSE-SLE-Live-Patching-12-SP5-2023-2689", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2689-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2689-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232689-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2689-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-June/030112.html" }, { "category": "self", "summary": "SUSE Bug 1210452", "url": "https://bugzilla.suse.com/1210452" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 41 for SLE 12 SP5)", "tracking": { "current_release_date": "2023-06-28T14:07:11Z", "generator": { "date": "2023-06-28T14:07:11Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2689-1", "initial_release_date": "2023-06-28T14:07:11Z", "revision_history": [ { "date": "2023-06-28T14:07:11Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_153-default-3-2.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_153-default-3-2.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_153-default-3-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_153-default-3-2.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_153-default-3-2.1.s390x", "product_id": "kgraft-patch-4_12_14-122_153-default-3-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_153-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_153-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_153-default-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_153-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_153-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_153-default-3-2.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_153-default-3-2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_153-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_153-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T14:07:11Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T14:07:11Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_153-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T14:07:11Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:2708-1
Vulnerability from csaf_suse
Published
2023-06-29 11:34
Modified
2023-06-29 11:34
Summary
Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP4)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP4)
Description of the patch
This update for the Linux Kernel 4.12.14-95_111 fixes several issues.
The following security issues were fixed:
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
Patchnames
SUSE-2023-2708,SUSE-SLE-Live-Patching-12-SP4-2023-2708
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP4)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-95_111 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2708,SUSE-SLE-Live-Patching-12-SP4-2023-2708", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2708-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2708-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232708-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2708-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-June/030140.html" }, { "category": "self", "summary": "SUSE Bug 1207189", "url": "https://bugzilla.suse.com/1207189" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP4)", "tracking": { "current_release_date": "2023-06-29T11:34:14Z", "generator": { "date": "2023-06-29T11:34:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2708-1", "initial_release_date": "2023-06-29T11:34:14Z", "revision_history": [ { "date": "2023-06-29T11:34:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_111-default-8-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_111-default-8-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-95_111-default-8-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_111-default-8-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-95_111-default-8-2.2.s390x", "product_id": "kgraft-patch-4_12_14-95_111-default-8-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-95_111-default-8-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_111-default-8-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-95_111-default-8-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_111-default-8-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_111-default-8-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_111-default-8-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_111-default-8-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_111-default-8-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_111-default-8-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T11:34:14Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T11:34:14Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_111-default-8-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T11:34:14Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:2710-1
Vulnerability from csaf_suse
Published
2023-06-29 11:34
Modified
2023-06-29 11:34
Summary
Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP3)
Description of the patch
This update for the Linux Kernel 5.3.18-150300_59_76 fixes several issues.
The following security issues were fixed:
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209672).
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).
Patchnames
SUSE-2023-2710,SUSE-SLE-Module-Live-Patching-15-SP3-2023-2710
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-150300_59_76 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209672).\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2710,SUSE-SLE-Module-Live-Patching-15-SP3-2023-2710", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2710-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2710-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232710-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2710-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-June/030138.html" }, { "category": "self", "summary": "SUSE Bug 1207189", "url": "https://bugzilla.suse.com/1207189" }, { "category": "self", "summary": "SUSE Bug 1209672", "url": "https://bugzilla.suse.com/1209672" }, { "category": "self", "summary": "SUSE Bug 1210452", "url": "https://bugzilla.suse.com/1210452" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4744 page", "url": "https://www.suse.com/security/cve/CVE-2022-4744/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP3)", "tracking": { "current_release_date": "2023-06-29T11:34:34Z", "generator": { "date": "2023-06-29T11:34:34Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2710-1", "initial_release_date": "2023-06-29T11:34:34Z", "revision_history": [ { "date": "2023-06-29T11:34:34Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_76-preempt-14-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_76-preempt-14-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_76-preempt-14-150300.2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-4744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4744" } ], "notes": [ { "category": "general", "text": "A double-free flaw was found in the Linux kernel\u0027s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4744", "url": "https://www.suse.com/security/cve/CVE-2022-4744" }, { "category": "external", "summary": "SUSE Bug 1209635 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209635" }, { "category": "external", "summary": "SUSE Bug 1209672 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209672" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T11:34:34Z", "details": "important" } ], "title": "CVE-2022-4744" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T11:34:34Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T11:34:34Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T11:34:34Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-14-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T11:34:34Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:2719-1
Vulnerability from csaf_suse
Published
2023-06-29 13:05
Modified
2023-06-29 13:05
Summary
Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP5)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP5)
Description of the patch
This update for the Linux Kernel 4.12.14-122_147 fixes several issues.
The following security issues were fixed:
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).
Patchnames
SUSE-2023-2719,SUSE-SLE-Live-Patching-12-SP5-2023-2719
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP5)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-122_147 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2719,SUSE-SLE-Live-Patching-12-SP5-2023-2719", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2719-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2719-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232719-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2719-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-June/030132.html" }, { "category": "self", "summary": "SUSE Bug 1210452", "url": "https://bugzilla.suse.com/1210452" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP5)", "tracking": { "current_release_date": "2023-06-29T13:05:27Z", "generator": { "date": "2023-06-29T13:05:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2719-1", "initial_release_date": "2023-06-29T13:05:27Z", "revision_history": [ { "date": "2023-06-29T13:05:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_147-default-5-2.2.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_147-default-5-2.2.ppc64le", "product_id": "kgraft-patch-4_12_14-122_147-default-5-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_147-default-5-2.2.s390x", "product": { "name": "kgraft-patch-4_12_14-122_147-default-5-2.2.s390x", "product_id": "kgraft-patch-4_12_14-122_147-default-5-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_12_14-122_147-default-5-2.2.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_147-default-5-2.2.x86_64", "product_id": "kgraft-patch-4_12_14-122_147-default-5-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_147-default-5-2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_147-default-5-2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_147-default-5-2.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_147-default-5-2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_147-default-5-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_147-default-5-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T13:05:27Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T13:05:27Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_147-default-5-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T13:05:27Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:1800-1
Vulnerability from csaf_suse
Published
2023-07-06 09:46
Modified
2023-07-06 09:46
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).
- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).
- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).
- CVE-2023-0394: Fixed a null pointer dereference flaw in the network subcomponent in the Linux kernel which could lead to system crash (bsc#1207168).
- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).
- CVE-2023-1075: Fixed a type confusion in tls_is_tx_ready (bsc#1208598).
- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).
- CVE-2023-1078: Fixed a heap out-of-bounds write in rds_rm_zerocopy_callback (bsc#1208601).
- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).
- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).
- CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-1582: Fixed soft lockup in __page_mapcount (bsc#1209636).
- CVE-2023-23004: Fixed misinterpretation of get_sg_table return value (bsc#1208843).
- CVE-2023-25012: Fixed a use-after-free in bigben_set_led() (bsc#1207560).
- CVE-2023-28327: Fixed DoS in in_skb in unix_diag_get_exact() (bsc#1209290).
- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1209366).
- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).
The following non-security bugs were fixed:
- Do not sign the vanilla kernel (bsc#1209008).
- PCI: hv: Add a per-bus mutex state_lock (bsc#1207185).
- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207185).
- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207185).
- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1207185).
- Revert 'PCI: hv: Fix a timing issue which causes kdump to fail occasionally' (bsc#1209785).
- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).
- kernel-module-subpackage: Fix expansion with -b parameter (bsc#1208179).
Patchnames
SUSE-2023-1800,SUSE-SLE-Module-Live-Patching-15-SP2-2023-1800,SUSE-SLE-Product-HA-15-SP2-2023-1800,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-1800,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-1800,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-1800,SUSE-Storage-7-2023-1800
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).\n- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).\n- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).\n- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).\n- CVE-2023-0394: Fixed a null pointer dereference flaw in the network subcomponent in the Linux kernel which could lead to system crash (bsc#1207168).\n- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).\n- CVE-2023-1075: Fixed a type confusion in tls_is_tx_ready (bsc#1208598).\n- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).\n- CVE-2023-1078: Fixed a heap out-of-bounds write in rds_rm_zerocopy_callback (bsc#1208601).\n- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).\n- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).\n- CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).\n- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).\n- CVE-2023-1582: Fixed soft lockup in __page_mapcount (bsc#1209636).\n- CVE-2023-23004: Fixed misinterpretation of get_sg_table return value (bsc#1208843).\n- CVE-2023-25012: Fixed a use-after-free in bigben_set_led() (bsc#1207560).\n- CVE-2023-28327: Fixed DoS in in_skb in unix_diag_get_exact() (bsc#1209290).\n- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).\n- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1209366).\n- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).\n\nThe following non-security bugs were fixed:\n\n- Do not sign the vanilla kernel (bsc#1209008).\n- PCI: hv: Add a per-bus mutex state_lock (bsc#1207185).\n- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207185).\n- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207185).\n- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1207185).\n- Revert \u0027PCI: hv: Fix a timing issue which causes kdump to fail occasionally\u0027 (bsc#1209785). \n- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).\n- kernel-module-subpackage: Fix expansion with -b parameter (bsc#1208179).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-1800,SUSE-SLE-Module-Live-Patching-15-SP2-2023-1800,SUSE-SLE-Product-HA-15-SP2-2023-1800,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-1800,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-1800,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-1800,SUSE-Storage-7-2023-1800", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_1800-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:1800-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20231800-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:1800-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" }, { "category": "self", "summary": "SUSE Bug 1207168", "url": "https://bugzilla.suse.com/1207168" }, { "category": "self", "summary": "SUSE Bug 1207185", "url": "https://bugzilla.suse.com/1207185" }, { "category": "self", "summary": "SUSE Bug 1207560", "url": "https://bugzilla.suse.com/1207560" }, { "category": "self", "summary": "SUSE Bug 1208179", "url": "https://bugzilla.suse.com/1208179" }, { "category": "self", "summary": "SUSE Bug 1208598", "url": "https://bugzilla.suse.com/1208598" }, { "category": "self", "summary": "SUSE Bug 1208599", "url": "https://bugzilla.suse.com/1208599" }, { "category": "self", "summary": "SUSE Bug 1208601", "url": "https://bugzilla.suse.com/1208601" }, { "category": "self", "summary": "SUSE Bug 1208777", "url": "https://bugzilla.suse.com/1208777" }, { "category": "self", "summary": "SUSE Bug 1208787", "url": "https://bugzilla.suse.com/1208787" }, { "category": "self", "summary": "SUSE Bug 1208843", "url": "https://bugzilla.suse.com/1208843" }, { "category": "self", "summary": "SUSE Bug 1209008", "url": "https://bugzilla.suse.com/1209008" }, { "category": "self", "summary": "SUSE Bug 1209052", "url": "https://bugzilla.suse.com/1209052" }, { "category": "self", "summary": "SUSE Bug 1209256", "url": "https://bugzilla.suse.com/1209256" }, { "category": "self", "summary": "SUSE Bug 1209288", "url": "https://bugzilla.suse.com/1209288" }, { "category": "self", "summary": "SUSE Bug 1209289", "url": "https://bugzilla.suse.com/1209289" }, { "category": "self", "summary": "SUSE Bug 1209290", "url": "https://bugzilla.suse.com/1209290" }, { "category": "self", "summary": "SUSE Bug 1209291", "url": "https://bugzilla.suse.com/1209291" }, { "category": "self", "summary": "SUSE Bug 1209366", "url": "https://bugzilla.suse.com/1209366" }, { "category": "self", "summary": "SUSE Bug 1209532", "url": "https://bugzilla.suse.com/1209532" }, { "category": "self", "summary": "SUSE Bug 1209547", "url": "https://bugzilla.suse.com/1209547" }, { "category": "self", "summary": "SUSE Bug 1209549", "url": "https://bugzilla.suse.com/1209549" }, { "category": "self", "summary": "SUSE Bug 1209634", "url": "https://bugzilla.suse.com/1209634" }, { "category": "self", "summary": "SUSE Bug 1209635", "url": "https://bugzilla.suse.com/1209635" }, { "category": "self", "summary": "SUSE Bug 1209636", "url": "https://bugzilla.suse.com/1209636" }, { "category": "self", "summary": "SUSE Bug 1209672", "url": "https://bugzilla.suse.com/1209672" }, { "category": "self", "summary": "SUSE Bug 1209683", "url": "https://bugzilla.suse.com/1209683" }, { "category": "self", "summary": "SUSE Bug 1209778", "url": "https://bugzilla.suse.com/1209778" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3923 page", "url": "https://www.suse.com/security/cve/CVE-2021-3923/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4744 page", "url": "https://www.suse.com/security/cve/CVE-2022-4744/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0394 page", "url": "https://www.suse.com/security/cve/CVE-2023-0394/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0461 page", "url": "https://www.suse.com/security/cve/CVE-2023-0461/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1075 page", "url": "https://www.suse.com/security/cve/CVE-2023-1075/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1076 page", "url": "https://www.suse.com/security/cve/CVE-2023-1076/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1078 page", "url": "https://www.suse.com/security/cve/CVE-2023-1078/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1095 page", "url": "https://www.suse.com/security/cve/CVE-2023-1095/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1281 page", "url": "https://www.suse.com/security/cve/CVE-2023-1281/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1382 page", "url": "https://www.suse.com/security/cve/CVE-2023-1382/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1513 page", "url": "https://www.suse.com/security/cve/CVE-2023-1513/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1582 page", "url": "https://www.suse.com/security/cve/CVE-2023-1582/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23004 page", "url": "https://www.suse.com/security/cve/CVE-2023-23004/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-25012 page", "url": "https://www.suse.com/security/cve/CVE-2023-25012/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28327 page", "url": "https://www.suse.com/security/cve/CVE-2023-28327/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28328 page", "url": "https://www.suse.com/security/cve/CVE-2023-28328/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28464 page", "url": "https://www.suse.com/security/cve/CVE-2023-28464/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28772 page", "url": "https://www.suse.com/security/cve/CVE-2023-28772/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2023-07-06T09:46:57Z", "generator": { "date": "2023-07-06T09:46:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:1800-1", "initial_release_date": "2023-07-06T09:46:57Z", "revision_history": [ { "date": "2023-07-06T09:46:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "product": { "name": "cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "product_id": "cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-150200.24.148.1.aarch64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-150200.24.148.1.aarch64", "product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "product": { "name": "dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "product_id": "dlm-kmp-default-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-150200.24.148.1.aarch64", "product": { "name": "dlm-kmp-preempt-5.3.18-150200.24.148.1.aarch64", "product_id": "dlm-kmp-preempt-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "product": { "name": "gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "product_id": "gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-150200.24.148.1.aarch64", "product": { "name": "gfs2-kmp-preempt-5.3.18-150200.24.148.1.aarch64", "product_id": "gfs2-kmp-preempt-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150200.24.148.1.aarch64", "product": { "name": "kernel-default-5.3.18-150200.24.148.1.aarch64", "product_id": "kernel-default-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "product": { "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "product_id": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "product": { "name": "kernel-default-base-rebuild-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "product_id": "kernel-default-base-rebuild-5.3.18-150200.24.148.1.150200.9.71.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "product": { "name": "kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "product_id": "kernel-default-devel-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150200.24.148.1.aarch64", "product": { "name": "kernel-default-extra-5.3.18-150200.24.148.1.aarch64", "product_id": "kernel-default-extra-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150200.24.148.1.aarch64", "product": { "name": "kernel-default-livepatch-5.3.18-150200.24.148.1.aarch64", "product_id": "kernel-default-livepatch-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.aarch64", "product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "product": { "name": "kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "product_id": "kernel-obs-build-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150200.24.148.1.aarch64", "product": { "name": "kernel-obs-qa-5.3.18-150200.24.148.1.aarch64", "product_id": "kernel-obs-qa-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-150200.24.148.1.aarch64", "product": { "name": "kernel-preempt-5.3.18-150200.24.148.1.aarch64", "product_id": "kernel-preempt-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "product": { "name": "kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "product_id": "kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-150200.24.148.1.aarch64", "product": { "name": "kernel-preempt-extra-5.3.18-150200.24.148.1.aarch64", "product_id": "kernel-preempt-extra-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.148.1.aarch64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.148.1.aarch64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150200.24.148.1.aarch64", "product": { "name": "kernel-syms-5.3.18-150200.24.148.1.aarch64", "product_id": "kernel-syms-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150200.24.148.1.aarch64", "product": { "name": "kselftests-kmp-default-5.3.18-150200.24.148.1.aarch64", "product_id": "kselftests-kmp-default-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-150200.24.148.1.aarch64", "product": { "name": "kselftests-kmp-preempt-5.3.18-150200.24.148.1.aarch64", "product_id": "kselftests-kmp-preempt-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "product": { "name": "ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "product_id": "ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-150200.24.148.1.aarch64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-150200.24.148.1.aarch64", "product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "product": { "name": "reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "product_id": "reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-150200.24.148.1.aarch64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-150200.24.148.1.aarch64", "product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.148.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-150200.24.148.1.noarch", "product": { "name": "kernel-devel-5.3.18-150200.24.148.1.noarch", "product_id": "kernel-devel-5.3.18-150200.24.148.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-150200.24.148.1.noarch", "product": { "name": "kernel-docs-5.3.18-150200.24.148.1.noarch", "product_id": "kernel-docs-5.3.18-150200.24.148.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-150200.24.148.1.noarch", "product": { "name": "kernel-docs-html-5.3.18-150200.24.148.1.noarch", "product_id": "kernel-docs-html-5.3.18-150200.24.148.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-150200.24.148.1.noarch", "product": { "name": "kernel-macros-5.3.18-150200.24.148.1.noarch", "product_id": "kernel-macros-5.3.18-150200.24.148.1.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-150200.24.148.1.noarch", "product": { "name": "kernel-source-5.3.18-150200.24.148.1.noarch", "product_id": "kernel-source-5.3.18-150200.24.148.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-150200.24.148.1.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-150200.24.148.1.noarch", "product_id": "kernel-source-vanilla-5.3.18-150200.24.148.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "product_id": "cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "product_id": "dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "product_id": "gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "kernel-debug-5.3.18-150200.24.148.1.ppc64le", "product_id": "kernel-debug-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "kernel-debug-devel-5.3.18-150200.24.148.1.ppc64le", "product_id": "kernel-debug-devel-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "kernel-default-5.3.18-150200.24.148.1.ppc64le", "product_id": "kernel-default-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "product": { "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "product_id": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "product_id": "kernel-default-base-rebuild-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "product_id": "kernel-default-devel-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "kernel-default-extra-5.3.18-150200.24.148.1.ppc64le", "product_id": "kernel-default-extra-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "product_id": "kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "kernel-kvmsmall-5.3.18-150200.24.148.1.ppc64le", "product_id": "kernel-kvmsmall-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.3.18-150200.24.148.1.ppc64le", "product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "product_id": "kernel-obs-build-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "kernel-obs-qa-5.3.18-150200.24.148.1.ppc64le", "product_id": "kernel-obs-qa-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "kernel-syms-5.3.18-150200.24.148.1.ppc64le", "product_id": "kernel-syms-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "kselftests-kmp-default-5.3.18-150200.24.148.1.ppc64le", "product_id": "kselftests-kmp-default-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "product_id": "ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "product": { "name": "reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "product_id": "reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "product": { "name": "cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "product_id": "cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "product": { "name": "dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "product_id": "dlm-kmp-default-5.3.18-150200.24.148.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "product": { "name": "gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "product_id": "gfs2-kmp-default-5.3.18-150200.24.148.1.s390x" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150200.24.148.1.s390x", "product": { "name": "kernel-default-5.3.18-150200.24.148.1.s390x", "product_id": "kernel-default-5.3.18-150200.24.148.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "product": { "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "product_id": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "product": { "name": "kernel-default-base-rebuild-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "product_id": "kernel-default-base-rebuild-5.3.18-150200.24.148.1.150200.9.71.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150200.24.148.1.s390x", "product": { "name": "kernel-default-devel-5.3.18-150200.24.148.1.s390x", "product_id": "kernel-default-devel-5.3.18-150200.24.148.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150200.24.148.1.s390x", "product": { "name": "kernel-default-extra-5.3.18-150200.24.148.1.s390x", "product_id": "kernel-default-extra-5.3.18-150200.24.148.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "product": { "name": "kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "product_id": "kernel-default-livepatch-5.3.18-150200.24.148.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "product_id": "kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150200.24.148.1.s390x", "product": { "name": "kernel-obs-build-5.3.18-150200.24.148.1.s390x", "product_id": "kernel-obs-build-5.3.18-150200.24.148.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150200.24.148.1.s390x", "product": { "name": "kernel-obs-qa-5.3.18-150200.24.148.1.s390x", "product_id": "kernel-obs-qa-5.3.18-150200.24.148.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150200.24.148.1.s390x", "product": { "name": "kernel-syms-5.3.18-150200.24.148.1.s390x", "product_id": "kernel-syms-5.3.18-150200.24.148.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.3.18-150200.24.148.1.s390x", "product": { "name": "kernel-zfcpdump-5.3.18-150200.24.148.1.s390x", "product_id": "kernel-zfcpdump-5.3.18-150200.24.148.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150200.24.148.1.s390x", "product": { "name": "kselftests-kmp-default-5.3.18-150200.24.148.1.s390x", "product_id": "kselftests-kmp-default-5.3.18-150200.24.148.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "product": { "name": "ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "product_id": "ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "product": { "name": "reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "product_id": "reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "product": { "name": "cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "product_id": "cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-150200.24.148.1.x86_64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-150200.24.148.1.x86_64", "product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "product": { "name": "dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "product_id": "dlm-kmp-default-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-150200.24.148.1.x86_64", "product": { "name": "dlm-kmp-preempt-5.3.18-150200.24.148.1.x86_64", "product_id": "dlm-kmp-preempt-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "product": { "name": "gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "product_id": "gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-150200.24.148.1.x86_64", "product": { "name": "gfs2-kmp-preempt-5.3.18-150200.24.148.1.x86_64", "product_id": "gfs2-kmp-preempt-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-debug-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-debug-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-debug-devel-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-default-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-default-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "product": { "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "product_id": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-150200.24.148.1.150200.9.71.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-default-devel-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-default-extra-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-default-extra-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-kvmsmall-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_148-preempt-1-150200.5.3.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150200_24_148-preempt-1-150200.5.3.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150200_24_148-preempt-1-150200.5.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-obs-build-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-obs-qa-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-preempt-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-preempt-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-preempt-extra-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-preempt-extra-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kernel-syms-5.3.18-150200.24.148.1.x86_64", "product_id": "kernel-syms-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kselftests-kmp-default-5.3.18-150200.24.148.1.x86_64", "product_id": "kselftests-kmp-default-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-150200.24.148.1.x86_64", "product": { "name": "kselftests-kmp-preempt-5.3.18-150200.24.148.1.x86_64", "product_id": "kselftests-kmp-preempt-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "product": { "name": "ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "product_id": "ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-150200.24.148.1.x86_64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-150200.24.148.1.x86_64", "product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "product": { "name": "reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "product_id": "reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-150200.24.148.1.x86_64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-150200.24.148.1.x86_64", "product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.148.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7", "product": { "name": "SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150200.24.148.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x" }, "product_reference": "kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150200.24.148.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150200.24.148.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x" }, "product_reference": "dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150200.24.148.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x" }, "product_reference": "gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.148.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.148.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150200.24.148.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150200.24.148.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150200.24.148.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150200.24.148.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150200.24.148.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150200.24.148.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.148.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150200.24.148.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150200.24.148.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch" }, "product_reference": "kernel-source-5.3.18-150200.24.148.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.148.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.148.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.148.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-150200.24.148.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.148.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x" }, "product_reference": "kernel-default-5.3.18-150200.24.148.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x" }, "product_reference": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.148.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.148.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.148.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.148.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150200.24.148.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150200.24.148.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150200.24.148.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150200.24.148.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150200.24.148.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150200.24.148.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.148.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.148.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.148.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.148.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150200.24.148.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150200.24.148.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch" }, "product_reference": "kernel-source-5.3.18-150200.24.148.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.148.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.148.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-150200.24.148.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.148.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x" }, "product_reference": "kernel-syms-5.3.18-150200.24.148.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.148.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-150200.24.148.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.148.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150200.24.148.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150200.24.148.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150200.24.148.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150200.24.148.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150200.24.148.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150200.24.148.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.148.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150200.24.148.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch" }, "product_reference": "kernel-source-5.3.18-150200.24.148.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.148.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-150200.24.148.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.148.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150200.24.148.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.148.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150200.24.148.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150200.24.148.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150200.24.148.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150200.24.148.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150200.24.148.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150200.24.148.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150200.24.148.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.148.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150200.24.148.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150200.24.148.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150200.24.148.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150200.24.148.1.noarch as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch" }, "product_reference": "kernel-source-5.3.18-150200.24.148.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.148.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150200.24.148.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64 as component of SUSE Enterprise Storage 7", "product_id": "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2021-3923", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3923" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3923", "url": "https://www.suse.com/security/cve/CVE-2021-3923" }, { "category": "external", "summary": "SUSE Bug 1209778 for CVE-2021-3923", "url": "https://bugzilla.suse.com/1209778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "low" } ], "title": "CVE-2021-3923" }, { "cve": "CVE-2022-4744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4744" } ], "notes": [ { "category": "general", "text": "A double-free flaw was found in the Linux kernel\u0027s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4744", "url": "https://www.suse.com/security/cve/CVE-2022-4744" }, { "category": "external", "summary": "SUSE Bug 1209635 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209635" }, { "category": "external", "summary": "SUSE Bug 1209672 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209672" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "important" } ], "title": "CVE-2022-4744" }, { "cve": "CVE-2023-0394", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0394" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0394", "url": "https://www.suse.com/security/cve/CVE-2023-0394" }, { "category": "external", "summary": "SUSE Bug 1207168 for CVE-2023-0394", "url": "https://bugzilla.suse.com/1207168" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "moderate" } ], "title": "CVE-2023-0394" }, { "cve": "CVE-2023-0461", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0461" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock.\n\nWhen CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt TCP_ULP operation does not require any privilege.\n\nWe recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0461", "url": "https://www.suse.com/security/cve/CVE-2023-0461" }, { "category": "external", "summary": "SUSE Bug 1208787 for CVE-2023-0461", "url": "https://bugzilla.suse.com/1208787" }, { "category": "external", "summary": "SUSE Bug 1208911 for CVE-2023-0461", "url": "https://bugzilla.suse.com/1208911" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-0461", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1217079 for CVE-2023-0461", "url": "https://bugzilla.suse.com/1217079" }, { "category": "external", "summary": "SUSE Bug 1218514 for CVE-2023-0461", "url": "https://bugzilla.suse.com/1218514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "important" } ], "title": "CVE-2023-0461" }, { "cve": "CVE-2023-1075", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1075" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel. The tls_is_tx_ready() incorrectly checks for list emptiness, potentially accessing a type confused entry to the list_head, leaking the last byte of the confused field that overlaps with rec-\u003etx_ready.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1075", "url": "https://www.suse.com/security/cve/CVE-2023-1075" }, { "category": "external", "summary": "SUSE Bug 1208598 for CVE-2023-1075", "url": "https://bugzilla.suse.com/1208598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "moderate" } ], "title": "CVE-2023-1075" }, { "cve": "CVE-2023-1076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1076" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1076", "url": "https://www.suse.com/security/cve/CVE-2023-1076" }, { "category": "external", "summary": "SUSE Bug 1208599 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1208599" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "moderate" } ], "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1078" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1078", "url": "https://www.suse.com/security/cve/CVE-2023-1078" }, { "category": "external", "summary": "SUSE Bug 1208601 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208601" }, { "category": "external", "summary": "SUSE Bug 1208603 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208603" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "important" } ], "title": "CVE-2023-1078" }, { "cve": "CVE-2023-1095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1095" } ], "notes": [ { "category": "general", "text": "In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1095", "url": "https://www.suse.com/security/cve/CVE-2023-1095" }, { "category": "external", "summary": "SUSE Bug 1208777 for CVE-2023-1095", "url": "https://bugzilla.suse.com/1208777" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "moderate" } ], "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1281" } ], "notes": [ { "category": "general", "text": "Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when \u0027tcf_exts_exec()\u0027 is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root.\nThis issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1281", "url": "https://www.suse.com/security/cve/CVE-2023-1281" }, { "category": "external", "summary": "SUSE Bug 1209634 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1209634" }, { "category": "external", "summary": "SUSE Bug 1209683 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1209683" }, { "category": "external", "summary": "SUSE Bug 1210335 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1210335" }, { "category": "external", "summary": "SUSE Bug 1210423 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1210423" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "important" } ], "title": "CVE-2023-1281" }, { "cve": "CVE-2023-1382", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1382" } ], "notes": [ { "category": "general", "text": "A data race flaw was found in the Linux kernel, between where con is allocated and con-\u003esock is set. This issue leads to a NULL pointer dereference when accessing con-\u003esock-\u003esk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1382", "url": "https://www.suse.com/security/cve/CVE-2023-1382" }, { "category": "external", "summary": "SUSE Bug 1209288 for CVE-2023-1382", "url": "https://bugzilla.suse.com/1209288" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "moderate" } ], "title": "CVE-2023-1382" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1513" } ], "notes": [ { "category": "general", "text": "A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1513", "url": "https://www.suse.com/security/cve/CVE-2023-1513" }, { "category": "external", "summary": "SUSE Bug 1209532 for CVE-2023-1513", "url": "https://bugzilla.suse.com/1209532" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "low" } ], "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1582", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1582" } ], "notes": [ { "category": "general", "text": "A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1582", "url": "https://www.suse.com/security/cve/CVE-2023-1582" }, { "category": "external", "summary": "SUSE Bug 1209636 for CVE-2023-1582", "url": "https://bugzilla.suse.com/1209636" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "moderate" } ], "title": "CVE-2023-1582" }, { "cve": "CVE-2023-23004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23004", "url": "https://www.suse.com/security/cve/CVE-2023-23004" }, { "category": "external", "summary": "SUSE Bug 1208843 for CVE-2023-23004", "url": "https://bugzilla.suse.com/1208843" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "moderate" } ], "title": "CVE-2023-23004" }, { "cve": "CVE-2023-25012", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-25012" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-25012", "url": "https://www.suse.com/security/cve/CVE-2023-25012" }, { "category": "external", "summary": "SUSE Bug 1207560 for CVE-2023-25012", "url": "https://bugzilla.suse.com/1207560" }, { "category": "external", "summary": "SUSE Bug 1207846 for CVE-2023-25012", "url": "https://bugzilla.suse.com/1207846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "moderate" } ], "title": "CVE-2023-25012" }, { "cve": "CVE-2023-28327", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28327" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28327", "url": "https://www.suse.com/security/cve/CVE-2023-28327" }, { "category": "external", "summary": "SUSE Bug 1209290 for CVE-2023-28327", "url": "https://bugzilla.suse.com/1209290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "moderate" } ], "title": "CVE-2023-28327" }, { "cve": "CVE-2023-28328", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28328" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28328", "url": "https://www.suse.com/security/cve/CVE-2023-28328" }, { "category": "external", "summary": "SUSE Bug 1209291 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1209291" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "moderate" } ], "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28464" } ], "notes": [ { "category": "general", "text": "hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28464", "url": "https://www.suse.com/security/cve/CVE-2023-28464" }, { "category": "external", "summary": "SUSE Bug 1209052 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1209052" }, { "category": "external", "summary": "SUSE Bug 1211111 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1211111" }, { "category": "external", "summary": "SUSE Bug 1220130 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1220130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "important" } ], "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-28772", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28772" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28772", "url": "https://www.suse.com/security/cve/CVE-2023-28772" }, { "category": "external", "summary": "SUSE Bug 1209549 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1209549" }, { "category": "external", "summary": "SUSE Bug 1211110 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1211110" }, { "category": "external", "summary": "SUSE Bug 1214378 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1214378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_148-default-1-150200.5.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.148.1.150200.9.71.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.148.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.148.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.148.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T09:46:57Z", "details": "important" } ], "title": "CVE-2023-28772" } ] }
suse-su-2023:2698-1
Vulnerability from csaf_suse
Published
2023-06-28 16:34
Modified
2023-06-28 16:34
Summary
Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP2)
Description of the patch
This update for the Linux Kernel 5.3.18-150200_24_142 fixes several issues.
The following security issues were fixed:
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209672).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).
Patchnames
SUSE-2023-2698,SUSE-SLE-Module-Live-Patching-15-SP2-2023-2698
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-150200_24_142 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209672).\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2698,SUSE-SLE-Module-Live-Patching-15-SP2-2023-2698", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2698-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2698-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232698-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2698-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015362.html" }, { "category": "self", "summary": "SUSE Bug 1209672", "url": "https://bugzilla.suse.com/1209672" }, { "category": "self", "summary": "SUSE Bug 1210452", "url": "https://bugzilla.suse.com/1210452" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4744 page", "url": "https://www.suse.com/security/cve/CVE-2022-4744/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP2)", "tracking": { "current_release_date": "2023-06-28T16:34:18Z", "generator": { "date": "2023-06-28T16:34:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2698-1", "initial_release_date": "2023-06-28T16:34:18Z", "revision_history": [ { "date": "2023-06-28T16:34:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_142-preempt-5-150200.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150200_24_142-preempt-5-150200.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150200_24_142-preempt-5-150200.2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-4744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4744" } ], "notes": [ { "category": "general", "text": "A double-free flaw was found in the Linux kernel\u0027s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4744", "url": "https://www.suse.com/security/cve/CVE-2022-4744" }, { "category": "external", "summary": "SUSE Bug 1209635 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209635" }, { "category": "external", "summary": "SUSE Bug 1209672 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209672" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T16:34:18Z", "details": "important" } ], "title": "CVE-2022-4744" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T16:34:18Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T16:34:18Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_142-default-5-150200.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T16:34:18Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:2741-1
Vulnerability from csaf_suse
Published
2023-06-30 09:05
Modified
2023-06-30 09:05
Summary
Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP3)
Description of the patch
This update for the Linux Kernel 5.3.18-150300_59_87 fixes several issues.
The following security issues were fixed:
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209672).
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).
Patchnames
SUSE-2023-2741,SUSE-SLE-Module-Live-Patching-15-SP3-2023-2741
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-150300_59_87 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209672).\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2741,SUSE-SLE-Module-Live-Patching-15-SP3-2023-2741", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2741-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2741-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232741-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2741-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015389.html" }, { "category": "self", "summary": "SUSE Bug 1207189", "url": "https://bugzilla.suse.com/1207189" }, { "category": "self", "summary": "SUSE Bug 1209672", "url": "https://bugzilla.suse.com/1209672" }, { "category": "self", "summary": "SUSE Bug 1210452", "url": "https://bugzilla.suse.com/1210452" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4744 page", "url": "https://www.suse.com/security/cve/CVE-2022-4744/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP3)", "tracking": { "current_release_date": "2023-06-30T09:05:23Z", "generator": { "date": "2023-06-30T09:05:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2741-1", "initial_release_date": "2023-06-30T09:05:23Z", "revision_history": [ { "date": "2023-06-30T09:05:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_87-preempt-13-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_87-preempt-13-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_87-preempt-13-150300.2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-4744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4744" } ], "notes": [ { "category": "general", "text": "A double-free flaw was found in the Linux kernel\u0027s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4744", "url": "https://www.suse.com/security/cve/CVE-2022-4744" }, { "category": "external", "summary": "SUSE Bug 1209635 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209635" }, { "category": "external", "summary": "SUSE Bug 1209672 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209672" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-30T09:05:23Z", "details": "important" } ], "title": "CVE-2022-4744" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-30T09:05:23Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-30T09:05:23Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-30T09:05:23Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-13-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-30T09:05:23Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:1848-1
Vulnerability from csaf_suse
Published
2023-07-06 01:18
Modified
2023-07-06 01:18
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).
- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).
- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).
- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bsc#1194535).
- CVE-2022-20567: Fixed use after free that could lead to a local privilege escalation in pppol2tp_create of l2tp_ppp.c (bsc#1208850).
- CVE-2023-0394: Fixed a null pointer dereference flaw in the network subcomponent in the Linux kernel which could lead to system crash (bsc#1207168).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).
- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).
- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).
- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).
- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).
The following non-security bugs were fixed:
- Do not sign the vanilla kernel (bsc#1209008).
- PCI: hv: Add a per-bus mutex state_lock (bsc#1208811).
- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1208811).
- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1208811).
- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1208811).
- Revert 'PCI: hv: Fix a timing issue which causes kdump to fail occasionally' (bsc#1208811).
- cifs: fix double free in dfs mounts (bsc#1209845).
- cifs: fix nodfs mount option (bsc#1209845).
- cifs: handle reconnect of tcon when there is no cached dfs referral (bsc#1209845).
- cifs: missing null pointer check in cifs_mount (bsc#1209845).
- cifs: serialize all mount attempts (bsc#1209845).
- cred: allow get_cred() and put_cred() to be given NULL (bsc#1209887).
- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).
- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).
- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).
- kernel-module-subpackage: Fix expansion with -b parameter (bsc#1208179).
Patchnames
SUSE-2023-1848,SUSE-SLE-Module-Live-Patching-15-SP1-2023-1848,SUSE-SLE-Product-HA-15-SP1-2023-1848,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-1848,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-1848,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-1848,openSUSE-SLE-15.4-2023-1848
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).\n- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).\n- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).\n- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bsc#1194535).\n- CVE-2022-20567: Fixed use after free that could lead to a local privilege escalation in pppol2tp_create of l2tp_ppp.c (bsc#1208850).\n- CVE-2023-0394: Fixed a null pointer dereference flaw in the network subcomponent in the Linux kernel which could lead to system crash (bsc#1207168).\n- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).\n- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).\n- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).\n- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).\n- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).\n- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).\n- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).\n- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).\n- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).\n\nThe following non-security bugs were fixed:\n\n- Do not sign the vanilla kernel (bsc#1209008).\n- PCI: hv: Add a per-bus mutex state_lock (bsc#1208811).\n- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1208811).\n- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1208811).\n- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1208811).\n- Revert \u0027PCI: hv: Fix a timing issue which causes kdump to fail occasionally\u0027 (bsc#1208811).\n- cifs: fix double free in dfs mounts (bsc#1209845).\n- cifs: fix nodfs mount option (bsc#1209845).\n- cifs: handle reconnect of tcon when there is no cached dfs referral (bsc#1209845).\n- cifs: missing null pointer check in cifs_mount (bsc#1209845).\n- cifs: serialize all mount attempts (bsc#1209845).\n- cred: allow get_cred() and put_cred() to be given NULL (bsc#1209887).\n- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).\n- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).\n- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).\n- kernel-module-subpackage: Fix expansion with -b parameter (bsc#1208179).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-1848,SUSE-SLE-Module-Live-Patching-15-SP1-2023-1848,SUSE-SLE-Product-HA-15-SP1-2023-1848,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-1848,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-1848,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-1848,openSUSE-SLE-15.4-2023-1848", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_1848-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:1848-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20231848-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:1848-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" }, { "category": "self", "summary": "SUSE Bug 1076830", "url": "https://bugzilla.suse.com/1076830" }, { "category": "self", "summary": "SUSE Bug 1192273", "url": "https://bugzilla.suse.com/1192273" }, { "category": "self", "summary": "SUSE Bug 1194535", "url": "https://bugzilla.suse.com/1194535" }, { "category": "self", "summary": "SUSE Bug 1207036", "url": "https://bugzilla.suse.com/1207036" }, { "category": "self", "summary": "SUSE Bug 1207125", "url": "https://bugzilla.suse.com/1207125" }, { "category": "self", "summary": "SUSE Bug 1207168", "url": "https://bugzilla.suse.com/1207168" }, { "category": "self", "summary": "SUSE Bug 1207795", "url": "https://bugzilla.suse.com/1207795" }, { "category": "self", "summary": "SUSE Bug 1208179", "url": "https://bugzilla.suse.com/1208179" }, { "category": "self", "summary": "SUSE Bug 1208599", "url": "https://bugzilla.suse.com/1208599" }, { "category": "self", "summary": "SUSE Bug 1208777", "url": "https://bugzilla.suse.com/1208777" }, { "category": "self", "summary": "SUSE Bug 1208811", "url": "https://bugzilla.suse.com/1208811" }, { "category": "self", "summary": "SUSE Bug 1208850", "url": "https://bugzilla.suse.com/1208850" }, { "category": "self", "summary": "SUSE Bug 1209008", "url": "https://bugzilla.suse.com/1209008" }, { "category": "self", "summary": "SUSE Bug 1209052", "url": "https://bugzilla.suse.com/1209052" }, { "category": "self", "summary": "SUSE Bug 1209256", "url": "https://bugzilla.suse.com/1209256" }, { "category": "self", "summary": "SUSE Bug 1209289", "url": "https://bugzilla.suse.com/1209289" }, { "category": "self", "summary": "SUSE Bug 1209291", "url": "https://bugzilla.suse.com/1209291" }, { "category": "self", "summary": "SUSE Bug 1209532", "url": "https://bugzilla.suse.com/1209532" }, { "category": "self", "summary": "SUSE Bug 1209547", "url": "https://bugzilla.suse.com/1209547" }, { "category": "self", "summary": "SUSE Bug 1209549", "url": "https://bugzilla.suse.com/1209549" }, { "category": "self", "summary": "SUSE Bug 1209634", "url": "https://bugzilla.suse.com/1209634" }, { "category": "self", "summary": "SUSE Bug 1209778", "url": "https://bugzilla.suse.com/1209778" }, { "category": "self", "summary": "SUSE Bug 1209845", "url": "https://bugzilla.suse.com/1209845" }, { "category": "self", "summary": "SUSE Bug 1209887", "url": "https://bugzilla.suse.com/1209887" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3923 page", "url": "https://www.suse.com/security/cve/CVE-2021-3923/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4203 page", "url": "https://www.suse.com/security/cve/CVE-2021-4203/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20567 page", "url": "https://www.suse.com/security/cve/CVE-2022-20567/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0394 page", "url": "https://www.suse.com/security/cve/CVE-2023-0394/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0590 page", "url": "https://www.suse.com/security/cve/CVE-2023-0590/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1076 page", "url": "https://www.suse.com/security/cve/CVE-2023-1076/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1095 page", "url": "https://www.suse.com/security/cve/CVE-2023-1095/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1281 page", "url": "https://www.suse.com/security/cve/CVE-2023-1281/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1513 page", "url": "https://www.suse.com/security/cve/CVE-2023-1513/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23454 page", "url": "https://www.suse.com/security/cve/CVE-2023-23454/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28328 page", "url": "https://www.suse.com/security/cve/CVE-2023-28328/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28464 page", "url": "https://www.suse.com/security/cve/CVE-2023-28464/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28772 page", "url": "https://www.suse.com/security/cve/CVE-2023-28772/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2023-07-06T01:18:33Z", "generator": { "date": "2023-07-06T01:18:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:1848-1", "initial_release_date": "2023-07-06T01:18:33Z", "revision_history": [ { "date": "2023-07-06T01:18:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150100.197.142.1.aarch64", "product": { "name": "kernel-default-4.12.14-150100.197.142.1.aarch64", "product_id": "kernel-default-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150100.197.142.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-150100.197.142.1.aarch64", "product_id": "kernel-default-base-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "product_id": "kernel-default-devel-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150100.197.142.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-150100.197.142.1.aarch64", "product_id": "kernel-default-extra-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150100.197.142.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-150100.197.142.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "product_id": "kernel-obs-build-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150100.197.142.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-150100.197.142.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150100.197.142.1.aarch64", "product": { "name": "kernel-syms-4.12.14-150100.197.142.1.aarch64", "product_id": "kernel-syms-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "product_id": "kernel-vanilla-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150100.197.142.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-150100.197.142.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-150100.197.142.1.noarch", "product": { "name": "kernel-devel-4.12.14-150100.197.142.1.noarch", "product_id": "kernel-devel-4.12.14-150100.197.142.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-150100.197.142.1.noarch", "product": { "name": "kernel-docs-4.12.14-150100.197.142.1.noarch", "product_id": "kernel-docs-4.12.14-150100.197.142.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-150100.197.142.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-150100.197.142.1.noarch", "product_id": "kernel-docs-html-4.12.14-150100.197.142.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-150100.197.142.1.noarch", "product": { "name": "kernel-macros-4.12.14-150100.197.142.1.noarch", "product_id": "kernel-macros-4.12.14-150100.197.142.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-150100.197.142.1.noarch", "product": { "name": "kernel-source-4.12.14-150100.197.142.1.noarch", "product_id": "kernel-source-4.12.14-150100.197.142.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-150100.197.142.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-150100.197.142.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-150100.197.142.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-150100.197.142.1.ppc64le", "product_id": "kernel-debug-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-150100.197.142.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kernel-default-4.12.14-150100.197.142.1.ppc64le", "product_id": "kernel-default-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "product_id": "kernel-default-base-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-150100.197.142.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-150100.197.142.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-150100.197.142.1.ppc64le", "product_id": "kernel-syms-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-150100.197.142.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "product_id": "dlm-kmp-default-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150100.197.142.1.s390x", "product": { "name": "kernel-default-4.12.14-150100.197.142.1.s390x", "product_id": "kernel-default-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150100.197.142.1.s390x", "product": { "name": "kernel-default-base-4.12.14-150100.197.142.1.s390x", "product_id": "kernel-default-base-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150100.197.142.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-150100.197.142.1.s390x", "product_id": "kernel-default-devel-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150100.197.142.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-150100.197.142.1.s390x", "product_id": "kernel-default-extra-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150100.197.142.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-150100.197.142.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150100.197.142.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150100.197.142.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-150100.197.142.1.s390x", "product": { "name": "kernel-default-man-4.12.14-150100.197.142.1.s390x", "product_id": "kernel-default-man-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150100.197.142.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-150100.197.142.1.s390x", "product_id": "kernel-obs-build-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150100.197.142.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-150100.197.142.1.s390x", "product_id": "kernel-obs-qa-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150100.197.142.1.s390x", "product": { "name": "kernel-syms-4.12.14-150100.197.142.1.s390x", "product_id": "kernel-syms-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150100.197.142.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-150100.197.142.1.s390x", "product_id": "kernel-vanilla-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-150100.197.142.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-150100.197.142.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150100.197.142.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-150100.197.142.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-debug-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-debug-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-debug-base-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-default-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-default-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-default-base-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-default-devel-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-default-extra-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-obs-build-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-syms-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-syms-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-vanilla-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150100.197.142.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-150100.197.142.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150100.197.142.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150100.197.142.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150100.197.142.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150100.197.142.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150100.197.142.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150100.197.142.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150100.197.142.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150100.197.142.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150100.197.142.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150100.197.142.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150100.197.142.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150100.197.142.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150100.197.142.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150100.197.142.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch" }, "product_reference": "kernel-source-4.12.14-150100.197.142.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150100.197.142.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150100.197.142.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150100.197.142.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x" }, "product_reference": "kernel-default-4.12.14-150100.197.142.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150100.197.142.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150100.197.142.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-150100.197.142.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150100.197.142.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150100.197.142.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-150100.197.142.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150100.197.142.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-150100.197.142.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150100.197.142.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150100.197.142.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150100.197.142.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150100.197.142.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150100.197.142.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150100.197.142.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150100.197.142.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150100.197.142.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-150100.197.142.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150100.197.142.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch" }, "product_reference": "kernel-source-4.12.14-150100.197.142.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150100.197.142.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150100.197.142.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x" }, "product_reference": "kernel-syms-4.12.14-150100.197.142.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150100.197.142.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150100.197.142.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150100.197.142.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150100.197.142.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150100.197.142.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150100.197.142.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150100.197.142.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch" }, "product_reference": "kernel-source-4.12.14-150100.197.142.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-150100.197.142.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-150100.197.142.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150100.197.142.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-150100.197.142.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-150100.197.142.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-150100.197.142.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-150100.197.142.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x" }, "product_reference": "kernel-vanilla-4.12.14-150100.197.142.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-150100.197.142.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150100.197.142.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x" }, "product_reference": "kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64" }, "product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le" }, "product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x" }, "product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64" }, "product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" }, "product_reference": "kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:18:33Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2021-3923", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3923" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3923", "url": "https://www.suse.com/security/cve/CVE-2021-3923" }, { "category": "external", "summary": "SUSE Bug 1209778 for CVE-2021-3923", "url": "https://bugzilla.suse.com/1209778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:18:33Z", "details": "low" } ], "title": "CVE-2021-3923" }, { "cve": "CVE-2021-4203", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-4203" } ], "notes": [ { "category": "general", "text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2021-4203", "url": "https://www.suse.com/security/cve/CVE-2021-4203" }, { "category": "external", "summary": "SUSE Bug 1194535 for CVE-2021-4203", "url": "https://bugzilla.suse.com/1194535" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:18:33Z", "details": "moderate" } ], "title": "CVE-2021-4203" }, { "cve": "CVE-2022-20567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20567" } ], "notes": [ { "category": "general", "text": "In pppol2tp_create of l2tp_ppp.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-186777253References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20567", "url": "https://www.suse.com/security/cve/CVE-2022-20567" }, { "category": "external", "summary": "SUSE Bug 1208850 for CVE-2022-20567", "url": "https://bugzilla.suse.com/1208850" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:18:33Z", "details": "moderate" } ], "title": "CVE-2022-20567" }, { "cve": "CVE-2023-0394", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0394" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0394", "url": "https://www.suse.com/security/cve/CVE-2023-0394" }, { "category": "external", "summary": "SUSE Bug 1207168 for CVE-2023-0394", "url": "https://bugzilla.suse.com/1207168" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:18:33Z", "details": "moderate" } ], "title": "CVE-2023-0394" }, { "cve": "CVE-2023-0590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0590" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0590", "url": "https://www.suse.com/security/cve/CVE-2023-0590" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207795 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207795" }, { "category": "external", "summary": "SUSE Bug 1207822 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207822" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1211495" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:18:33Z", "details": "important" } ], "title": "CVE-2023-0590" }, { "cve": "CVE-2023-1076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1076" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1076", "url": "https://www.suse.com/security/cve/CVE-2023-1076" }, { "category": "external", "summary": "SUSE Bug 1208599 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1208599" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:18:33Z", "details": "moderate" } ], "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1095" } ], "notes": [ { "category": "general", "text": "In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1095", "url": "https://www.suse.com/security/cve/CVE-2023-1095" }, { "category": "external", "summary": "SUSE Bug 1208777 for CVE-2023-1095", "url": "https://bugzilla.suse.com/1208777" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:18:33Z", "details": "moderate" } ], "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1281" } ], "notes": [ { "category": "general", "text": "Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when \u0027tcf_exts_exec()\u0027 is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root.\nThis issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1281", "url": "https://www.suse.com/security/cve/CVE-2023-1281" }, { "category": "external", "summary": "SUSE Bug 1209634 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1209634" }, { "category": "external", "summary": "SUSE Bug 1209683 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1209683" }, { "category": "external", "summary": "SUSE Bug 1210335 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1210335" }, { "category": "external", "summary": "SUSE Bug 1210423 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1210423" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:18:33Z", "details": "important" } ], "title": "CVE-2023-1281" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:18:33Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1513" } ], "notes": [ { "category": "general", "text": "A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1513", "url": "https://www.suse.com/security/cve/CVE-2023-1513" }, { "category": "external", "summary": "SUSE Bug 1209532 for CVE-2023-1513", "url": "https://bugzilla.suse.com/1209532" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:18:33Z", "details": "low" } ], "title": "CVE-2023-1513" }, { "cve": "CVE-2023-23454", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23454" } ], "notes": [ { "category": "general", "text": "cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23454", "url": "https://www.suse.com/security/cve/CVE-2023-23454" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207188 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1207188" }, { "category": "external", "summary": "SUSE Bug 1208030 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208030" }, { "category": "external", "summary": "SUSE Bug 1208044 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208044" }, { "category": "external", "summary": "SUSE Bug 1208085 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208085" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:18:33Z", "details": "important" } ], "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:18:33Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-28328", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28328" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28328", "url": "https://www.suse.com/security/cve/CVE-2023-28328" }, { "category": "external", "summary": "SUSE Bug 1209291 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1209291" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:18:33Z", "details": "moderate" } ], "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28464" } ], "notes": [ { "category": "general", "text": "hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28464", "url": "https://www.suse.com/security/cve/CVE-2023-28464" }, { "category": "external", "summary": "SUSE Bug 1209052 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1209052" }, { "category": "external", "summary": "SUSE Bug 1211111 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1211111" }, { "category": "external", "summary": "SUSE Bug 1220130 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1220130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:18:33Z", "details": "important" } ], "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28772", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28772" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28772", "url": "https://www.suse.com/security/cve/CVE-2023-28772" }, { "category": "external", "summary": "SUSE Bug 1209549 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1209549" }, { "category": "external", "summary": "SUSE Bug 1211110 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1211110" }, { "category": "external", "summary": "SUSE Bug 1214378 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1214378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_142-default-1-150100.3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.142.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.142.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.aarch64", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.ppc64le", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.s390x", "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.142.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.142.1.s390x" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:18:33Z", "details": "important" } ], "title": "CVE-2023-28772" } ] }
suse-su-2023:2681-1
Vulnerability from csaf_suse
Published
2023-06-28 12:08
Modified
2023-06-28 12:08
Summary
Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP1)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP1)
Description of the patch
This update for the Linux Kernel 4.12.14-150100_197_134 fixes several issues.
The following security issues were fixed:
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).
Patchnames
SUSE-2023-2681,SUSE-SLE-Module-Live-Patching-15-SP1-2023-2681
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.12.14-150100_197_134 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2681,SUSE-SLE-Module-Live-Patching-15-SP1-2023-2681", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2681-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2681-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232681-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2681-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015349.html" }, { "category": "self", "summary": "SUSE Bug 1210452", "url": "https://bugzilla.suse.com/1210452" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP1)", "tracking": { "current_release_date": "2023-06-28T12:08:09Z", "generator": { "date": "2023-06-28T12:08:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2681-1", "initial_release_date": "2023-06-28T12:08:09Z", "revision_history": [ { "date": "2023-06-28T12:08:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.ppc64le", "product_id": "kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.x86_64", "product_id": "kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T12:08:09Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T12:08:09Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_134-default-5-150100.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T12:08:09Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:2724-1
Vulnerability from csaf_suse
Published
2023-06-29 16:06
Modified
2023-06-29 16:06
Summary
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP3)
Description of the patch
This update for the Linux Kernel 5.3.18-150300_59_109 fixes several issues.
The following security issues were fixed:
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209672).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).
Patchnames
SUSE-2023-2724,SUSE-SLE-Module-Live-Patching-15-SP3-2023-2724
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-150300_59_109 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209672).\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2724,SUSE-SLE-Module-Live-Patching-15-SP3-2023-2724", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2724-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2724-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232724-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2724-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-June/030147.html" }, { "category": "self", "summary": "SUSE Bug 1209672", "url": "https://bugzilla.suse.com/1209672" }, { "category": "self", "summary": "SUSE Bug 1210452", "url": "https://bugzilla.suse.com/1210452" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4744 page", "url": "https://www.suse.com/security/cve/CVE-2022-4744/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP3)", "tracking": { "current_release_date": "2023-06-29T16:06:36Z", "generator": { "date": "2023-06-29T16:06:36Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2724-1", "initial_release_date": "2023-06-29T16:06:36Z", "revision_history": [ { "date": "2023-06-29T16:06:36Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_109-preempt-6-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_109-preempt-6-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_109-preempt-6-150300.2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-4744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4744" } ], "notes": [ { "category": "general", "text": "A double-free flaw was found in the Linux kernel\u0027s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4744", "url": "https://www.suse.com/security/cve/CVE-2022-4744" }, { "category": "external", "summary": "SUSE Bug 1209635 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209635" }, { "category": "external", "summary": "SUSE Bug 1209672 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209672" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T16:06:36Z", "details": "important" } ], "title": "CVE-2022-4744" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T16:06:36Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T16:06:36Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_109-default-6-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T16:06:36Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:2695-1
Vulnerability from csaf_suse
Published
2023-06-28 16:07
Modified
2023-06-28 16:07
Summary
Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP2)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP2)
Description of the patch
This update for the Linux Kernel 5.3.18-150200_24_129 fixes several issues.
The following security issues were fixed:
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209672).
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).
Patchnames
SUSE-2023-2695,SUSE-SLE-Module-Live-Patching-15-SP2-2023-2695
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-150200_24_129 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209672).\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2695,SUSE-SLE-Module-Live-Patching-15-SP2-2023-2695", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2695-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2695-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232695-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2695-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-June/030122.html" }, { "category": "self", "summary": "SUSE Bug 1207189", "url": "https://bugzilla.suse.com/1207189" }, { "category": "self", "summary": "SUSE Bug 1209672", "url": "https://bugzilla.suse.com/1209672" }, { "category": "self", "summary": "SUSE Bug 1210452", "url": "https://bugzilla.suse.com/1210452" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4744 page", "url": "https://www.suse.com/security/cve/CVE-2022-4744/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP2)", "tracking": { "current_release_date": "2023-06-28T16:07:25Z", "generator": { "date": "2023-06-28T16:07:25Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2695-1", "initial_release_date": "2023-06-28T16:07:25Z", "revision_history": [ { "date": "2023-06-28T16:07:25Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_129-preempt-9-150200.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150200_24_129-preempt-9-150200.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150200_24_129-preempt-9-150200.2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-4744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4744" } ], "notes": [ { "category": "general", "text": "A double-free flaw was found in the Linux kernel\u0027s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4744", "url": "https://www.suse.com/security/cve/CVE-2022-4744" }, { "category": "external", "summary": "SUSE Bug 1209635 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209635" }, { "category": "external", "summary": "SUSE Bug 1209672 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209672" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T16:07:25Z", "details": "important" } ], "title": "CVE-2022-4744" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T16:07:25Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T16:07:25Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T16:07:25Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-9-150200.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-28T16:07:25Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:2727-1
Vulnerability from csaf_suse
Published
2023-06-29 17:05
Modified
2023-06-29 17:05
Summary
Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP3)
Description of the patch
This update for the Linux Kernel 5.3.18-150300_59_90 fixes several issues.
The following security issues were fixed:
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209672).
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).
Patchnames
SUSE-2023-2727,SUSE-SLE-Module-Live-Patching-15-SP2-2023-2727,SUSE-SLE-Module-Live-Patching-15-SP3-2023-2728
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-150300_59_90 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209672).\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207189).\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2727,SUSE-SLE-Module-Live-Patching-15-SP2-2023-2727,SUSE-SLE-Module-Live-Patching-15-SP3-2023-2728", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2727-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2727-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232727-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2727-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-June/030148.html" }, { "category": "self", "summary": "SUSE Bug 1207189", "url": "https://bugzilla.suse.com/1207189" }, { "category": "self", "summary": "SUSE Bug 1209672", "url": "https://bugzilla.suse.com/1209672" }, { "category": "self", "summary": "SUSE Bug 1210452", "url": "https://bugzilla.suse.com/1210452" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4744 page", "url": "https://www.suse.com/security/cve/CVE-2022-4744/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP3)", "tracking": { "current_release_date": "2023-06-29T17:05:22Z", "generator": { "date": "2023-06-29T17:05:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2727-1", "initial_release_date": "2023-06-29T17:05:22Z", "revision_history": [ { "date": "2023-06-29T17:05:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150200_24_139-preempt-6-150200.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150200_24_139-preempt-6-150200.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150200_24_139-preempt-6-150200.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-4744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4744" } ], "notes": [ { "category": "general", "text": "A double-free flaw was found in the Linux kernel\u0027s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4744", "url": "https://www.suse.com/security/cve/CVE-2022-4744" }, { "category": "external", "summary": "SUSE Bug 1209635 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209635" }, { "category": "external", "summary": "SUSE Bug 1209672 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209672" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T17:05:22Z", "details": "important" } ], "title": "CVE-2022-4744" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T17:05:22Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T17:05:22Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T17:05:22Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_139-default-6-150200.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_90-default-12-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T17:05:22Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:2701-1
Vulnerability from csaf_suse
Published
2023-06-29 01:34
Modified
2023-06-29 01:34
Summary
Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP3)
Description of the patch
This update for the Linux Kernel 5.3.18-150300_59_115 fixes several issues.
The following security issues were fixed:
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209672).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).
Patchnames
SUSE-2023-2701,SUSE-SLE-Module-Live-Patching-15-SP3-2023-2701
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-150300_59_115 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209672).\n- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210989).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1210779).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1210452).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2701,SUSE-SLE-Module-Live-Patching-15-SP3-2023-2701", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2701-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2701-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232701-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2701-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015369.html" }, { "category": "self", "summary": "SUSE Bug 1209672", "url": "https://bugzilla.suse.com/1209672" }, { "category": "self", "summary": "SUSE Bug 1210452", "url": "https://bugzilla.suse.com/1210452" }, { "category": "self", "summary": "SUSE Bug 1210779", "url": "https://bugzilla.suse.com/1210779" }, { "category": "self", "summary": "SUSE Bug 1210989", "url": "https://bugzilla.suse.com/1210989" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4744 page", "url": "https://www.suse.com/security/cve/CVE-2022-4744/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31436 page", "url": "https://www.suse.com/security/cve/CVE-2023-31436/" } ], "title": "Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP3)", "tracking": { "current_release_date": "2023-06-29T01:34:51Z", "generator": { "date": "2023-06-29T01:34:51Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2701-1", "initial_release_date": "2023-06-29T01:34:51Z", "revision_history": [ { "date": "2023-06-29T01:34:51Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_115-preempt-4-150300.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_115-preempt-4-150300.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_115-preempt-4-150300.2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-4744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4744" } ], "notes": [ { "category": "general", "text": "A double-free flaw was found in the Linux kernel\u0027s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4744", "url": "https://www.suse.com/security/cve/CVE-2022-4744" }, { "category": "external", "summary": "SUSE Bug 1209635 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209635" }, { "category": "external", "summary": "SUSE Bug 1209672 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209672" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T01:34:51Z", "details": "important" } ], "title": "CVE-2022-4744" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T01:34:51Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T01:34:51Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-31436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31436" } ], "notes": [ { "category": "general", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31436", "url": "https://www.suse.com/security/cve/CVE-2023-31436" }, { "category": "external", "summary": "SUSE Bug 1210940 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1210940" }, { "category": "external", "summary": "SUSE Bug 1211260 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1211260" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1223091 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1223091" }, { "category": "external", "summary": "SUSE Bug 1224419 for CVE-2023-31436", "url": "https://bugzilla.suse.com/1224419" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_115-default-4-150300.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-06-29T01:34:51Z", "details": "important" } ], "title": "CVE-2023-31436" } ] }
suse-su-2023:1892-1
Vulnerability from csaf_suse
Published
2023-07-06 01:58
Modified
2023-07-06 01:58
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).
- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-28464: Fixed use-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).
- CVE-2023-0394: Fixed a null pointer dereference flaw in the network subcomponent in the Linux kernel which could lead to system crash (bsc#1207168).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1209366).
- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).
- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).
- CVE-2023-1582: Fixed soft lockup in __page_mapcount (bsc#1209636).
- CVE-2023-28327: Fixed DoS in in_skb in unix_diag_get_exact() (bsc#1209290).
- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).
- CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).
- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).
- CVE-2023-1078: Fixed a heap out-of-bounds write in rds_rm_zerocopy_callback (bsc#1208601).
- CVE-2023-1075: Fixed a type confusion in tls_is_tx_ready (bsc#1208598).
- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).
The following non-security bugs were fixed:
- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).
- net: ena: optimize data access in fast-path code (bsc#1208137).
- PCI: hv: Add a per-bus mutex state_lock (bsc#1209785).
- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1209785).
- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1209785).
- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1209785).
Patchnames
SUSE-2023-1892,SUSE-SLE-Module-RT-15-SP3-2023-1892,SUSE-SUSE-MicroOS-5.1-2023-1892,SUSE-SUSE-MicroOS-5.2-2023-1892
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).\n- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).\n- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).\n- CVE-2023-28464: Fixed use-after-free that could lead to privilege escalation in hci_conn_cleanup in net/bluetooth/hci_conn.c (bsc#1209052).\n- CVE-2023-0394: Fixed a null pointer dereference flaw in the network subcomponent in the Linux kernel which could lead to system crash (bsc#1207168).\n- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1209366).\n- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).\n- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).\n- CVE-2023-1281: Fixed use after free that could lead to privilege escalation in tcindex (bsc#1209634).\n- CVE-2023-1582: Fixed soft lockup in __page_mapcount (bsc#1209636).\n- CVE-2023-28327: Fixed DoS in in_skb in unix_diag_get_exact() (bsc#1209290).\n- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).\n- CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).\n- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).\n- CVE-2023-1078: Fixed a heap out-of-bounds write in rds_rm_zerocopy_callback (bsc#1208601).\n- CVE-2023-1075: Fixed a type confusion in tls_is_tx_ready (bsc#1208598).\n- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).\n\nThe following non-security bugs were fixed:\n\n- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).\n- net: ena: optimize data access in fast-path code (bsc#1208137).\n- PCI: hv: Add a per-bus mutex state_lock (bsc#1209785).\n- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1209785).\n- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1209785).\n- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1209785).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-1892,SUSE-SLE-Module-RT-15-SP3-2023-1892,SUSE-SUSE-MicroOS-5.1-2023-1892,SUSE-SUSE-MicroOS-5.2-2023-1892", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_1892-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:1892-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20231892-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:1892-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" }, { "category": "self", "summary": "SUSE Bug 1207168", "url": "https://bugzilla.suse.com/1207168" }, { "category": "self", "summary": "SUSE Bug 1208137", "url": "https://bugzilla.suse.com/1208137" }, { "category": "self", "summary": "SUSE Bug 1208598", "url": "https://bugzilla.suse.com/1208598" }, { "category": "self", "summary": "SUSE Bug 1208601", "url": "https://bugzilla.suse.com/1208601" }, { "category": "self", "summary": "SUSE Bug 1208787", "url": "https://bugzilla.suse.com/1208787" }, { "category": "self", "summary": "SUSE Bug 1209052", "url": "https://bugzilla.suse.com/1209052" }, { "category": "self", "summary": "SUSE Bug 1209256", "url": "https://bugzilla.suse.com/1209256" }, { "category": "self", "summary": "SUSE Bug 1209288", "url": "https://bugzilla.suse.com/1209288" }, { "category": "self", "summary": "SUSE Bug 1209289", "url": "https://bugzilla.suse.com/1209289" }, { "category": "self", "summary": "SUSE Bug 1209290", "url": "https://bugzilla.suse.com/1209290" }, { "category": "self", "summary": "SUSE Bug 1209291", "url": "https://bugzilla.suse.com/1209291" }, { "category": "self", "summary": "SUSE Bug 1209366", "url": "https://bugzilla.suse.com/1209366" }, { "category": "self", "summary": "SUSE Bug 1209532", "url": "https://bugzilla.suse.com/1209532" }, { "category": "self", "summary": "SUSE Bug 1209547", "url": "https://bugzilla.suse.com/1209547" }, { "category": "self", "summary": "SUSE Bug 1209549", "url": "https://bugzilla.suse.com/1209549" }, { "category": "self", "summary": "SUSE Bug 1209634", "url": "https://bugzilla.suse.com/1209634" }, { "category": "self", "summary": "SUSE Bug 1209635", "url": "https://bugzilla.suse.com/1209635" }, { "category": "self", "summary": "SUSE Bug 1209636", "url": "https://bugzilla.suse.com/1209636" }, { "category": "self", "summary": "SUSE Bug 1209778", "url": "https://bugzilla.suse.com/1209778" }, { "category": "self", "summary": "SUSE Bug 1209785", "url": "https://bugzilla.suse.com/1209785" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3923 page", "url": "https://www.suse.com/security/cve/CVE-2021-3923/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4744 page", "url": "https://www.suse.com/security/cve/CVE-2022-4744/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0394 page", "url": "https://www.suse.com/security/cve/CVE-2023-0394/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0461 page", "url": "https://www.suse.com/security/cve/CVE-2023-0461/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1075 page", "url": "https://www.suse.com/security/cve/CVE-2023-1075/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1078 page", "url": "https://www.suse.com/security/cve/CVE-2023-1078/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1281 page", "url": "https://www.suse.com/security/cve/CVE-2023-1281/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1382 page", "url": "https://www.suse.com/security/cve/CVE-2023-1382/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1513 page", "url": "https://www.suse.com/security/cve/CVE-2023-1513/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1582 page", "url": "https://www.suse.com/security/cve/CVE-2023-1582/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28327 page", "url": "https://www.suse.com/security/cve/CVE-2023-28327/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28328 page", "url": "https://www.suse.com/security/cve/CVE-2023-28328/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28464 page", "url": "https://www.suse.com/security/cve/CVE-2023-28464/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28466 page", "url": "https://www.suse.com/security/cve/CVE-2023-28466/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28772 page", "url": "https://www.suse.com/security/cve/CVE-2023-28772/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2023-07-06T01:58:50Z", "generator": { "date": "2023-07-06T01:58:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:1892-1", "initial_release_date": "2023-07-06T01:58:50Z", "revision_history": [ { "date": "2023-07-06T01:58:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-150300.124.1.noarch", "product": { "name": "kernel-devel-rt-5.3.18-150300.124.1.noarch", "product_id": "kernel-devel-rt-5.3.18-150300.124.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-150300.124.1.noarch", "product": { "name": "kernel-source-rt-5.3.18-150300.124.1.noarch", "product_id": "kernel-source-rt-5.3.18-150300.124.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-150300.124.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-150300.124.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "product_id": "dlm-kmp-rt-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-150300.124.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-150300.124.1.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-150300.124.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-150300.124.1.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-150300.124.1.x86_64", "product": { "name": "kernel-rt-5.3.18-150300.124.1.x86_64", "product_id": "kernel-rt-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-150300.124.1.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-150300.124.1.x86_64", "product_id": "kernel-rt-devel-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-150300.124.1.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-150300.124.1.x86_64", "product_id": "kernel-rt-extra-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-5.3.18-150300.124.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-5.3.18-150300.124.1.x86_64", "product_id": "kernel-rt-livepatch-devel-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-optional-5.3.18-150300.124.1.x86_64", "product": { "name": "kernel-rt-optional-5.3.18-150300.124.1.x86_64", "product_id": "kernel-rt-optional-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-150300.124.1.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-150300.124.1.x86_64", "product_id": "kernel-rt_debug-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-150300.124.1.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-150300.124.1.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.124.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.124.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-optional-5.3.18-150300.124.1.x86_64", "product": { "name": "kernel-rt_debug-optional-5.3.18-150300.124.1.x86_64", "product_id": "kernel-rt_debug-optional-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-150300.124.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-150300.124.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-150300.124.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-150300.124.1.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-150300.124.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-150300.124.1.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-150300.124.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-150300.124.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-150300.124.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-150300.124.1.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-150300.124.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-150300.124.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-150300.124.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-150300.124.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Real Time Module 15 SP3", "product": { "name": "SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-rt:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-5.3.18-150300.124.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64" }, "product_reference": "dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-5.3.18-150300.124.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64" }, "product_reference": "gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-5.3.18-150300.124.1.noarch as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch" }, "product_reference": "kernel-devel-rt-5.3.18-150300.124.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150300.124.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-150300.124.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-5.3.18-150300.124.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64" }, "product_reference": "kernel-rt-devel-5.3.18-150300.124.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-150300.124.1.noarch as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch" }, "product_reference": "kernel-source-rt-5.3.18-150300.124.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-5.3.18-150300.124.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64" }, "product_reference": "kernel-syms-rt-5.3.18-150300.124.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150300.124.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-150300.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150300.124.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-150300.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:58:50Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2021-3923", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3923" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3923", "url": "https://www.suse.com/security/cve/CVE-2021-3923" }, { "category": "external", "summary": "SUSE Bug 1209778 for CVE-2021-3923", "url": "https://bugzilla.suse.com/1209778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:58:50Z", "details": "low" } ], "title": "CVE-2021-3923" }, { "cve": "CVE-2022-4744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4744" } ], "notes": [ { "category": "general", "text": "A double-free flaw was found in the Linux kernel\u0027s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4744", "url": "https://www.suse.com/security/cve/CVE-2022-4744" }, { "category": "external", "summary": "SUSE Bug 1209635 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209635" }, { "category": "external", "summary": "SUSE Bug 1209672 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1209672" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2022-4744", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:58:50Z", "details": "important" } ], "title": "CVE-2022-4744" }, { "cve": "CVE-2023-0394", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0394" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0394", "url": "https://www.suse.com/security/cve/CVE-2023-0394" }, { "category": "external", "summary": "SUSE Bug 1207168 for CVE-2023-0394", "url": "https://bugzilla.suse.com/1207168" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:58:50Z", "details": "moderate" } ], "title": "CVE-2023-0394" }, { "cve": "CVE-2023-0461", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0461" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege.\n\nThere is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock.\n\nWhen CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.\n\nThe setsockopt TCP_ULP operation does not require any privilege.\n\nWe recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0461", "url": "https://www.suse.com/security/cve/CVE-2023-0461" }, { "category": "external", "summary": "SUSE Bug 1208787 for CVE-2023-0461", "url": "https://bugzilla.suse.com/1208787" }, { "category": "external", "summary": "SUSE Bug 1208911 for CVE-2023-0461", "url": "https://bugzilla.suse.com/1208911" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-0461", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1217079 for CVE-2023-0461", "url": "https://bugzilla.suse.com/1217079" }, { "category": "external", "summary": "SUSE Bug 1218514 for CVE-2023-0461", "url": "https://bugzilla.suse.com/1218514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:58:50Z", "details": "important" } ], "title": "CVE-2023-0461" }, { "cve": "CVE-2023-1075", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1075" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel. The tls_is_tx_ready() incorrectly checks for list emptiness, potentially accessing a type confused entry to the list_head, leaking the last byte of the confused field that overlaps with rec-\u003etx_ready.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1075", "url": "https://www.suse.com/security/cve/CVE-2023-1075" }, { "category": "external", "summary": "SUSE Bug 1208598 for CVE-2023-1075", "url": "https://bugzilla.suse.com/1208598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:58:50Z", "details": "moderate" } ], "title": "CVE-2023-1075" }, { "cve": "CVE-2023-1078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1078" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1078", "url": "https://www.suse.com/security/cve/CVE-2023-1078" }, { "category": "external", "summary": "SUSE Bug 1208601 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208601" }, { "category": "external", "summary": "SUSE Bug 1208603 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208603" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:58:50Z", "details": "important" } ], "title": "CVE-2023-1078" }, { "cve": "CVE-2023-1281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1281" } ], "notes": [ { "category": "general", "text": "Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when \u0027tcf_exts_exec()\u0027 is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root.\nThis issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1281", "url": "https://www.suse.com/security/cve/CVE-2023-1281" }, { "category": "external", "summary": "SUSE Bug 1209634 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1209634" }, { "category": "external", "summary": "SUSE Bug 1209683 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1209683" }, { "category": "external", "summary": "SUSE Bug 1210335 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1210335" }, { "category": "external", "summary": "SUSE Bug 1210423 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1210423" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-1281", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:58:50Z", "details": "important" } ], "title": "CVE-2023-1281" }, { "cve": "CVE-2023-1382", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1382" } ], "notes": [ { "category": "general", "text": "A data race flaw was found in the Linux kernel, between where con is allocated and con-\u003esock is set. This issue leads to a NULL pointer dereference when accessing con-\u003esock-\u003esk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1382", "url": "https://www.suse.com/security/cve/CVE-2023-1382" }, { "category": "external", "summary": "SUSE Bug 1209288 for CVE-2023-1382", "url": "https://bugzilla.suse.com/1209288" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:58:50Z", "details": "moderate" } ], "title": "CVE-2023-1382" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:58:50Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1513" } ], "notes": [ { "category": "general", "text": "A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1513", "url": "https://www.suse.com/security/cve/CVE-2023-1513" }, { "category": "external", "summary": "SUSE Bug 1209532 for CVE-2023-1513", "url": "https://bugzilla.suse.com/1209532" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:58:50Z", "details": "low" } ], "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1582", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1582" } ], "notes": [ { "category": "general", "text": "A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1582", "url": "https://www.suse.com/security/cve/CVE-2023-1582" }, { "category": "external", "summary": "SUSE Bug 1209636 for CVE-2023-1582", "url": "https://bugzilla.suse.com/1209636" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:58:50Z", "details": "moderate" } ], "title": "CVE-2023-1582" }, { "cve": "CVE-2023-28327", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28327" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28327", "url": "https://www.suse.com/security/cve/CVE-2023-28327" }, { "category": "external", "summary": "SUSE Bug 1209290 for CVE-2023-28327", "url": "https://bugzilla.suse.com/1209290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:58:50Z", "details": "moderate" } ], "title": "CVE-2023-28327" }, { "cve": "CVE-2023-28328", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28328" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28328", "url": "https://www.suse.com/security/cve/CVE-2023-28328" }, { "category": "external", "summary": "SUSE Bug 1209291 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1209291" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:58:50Z", "details": "moderate" } ], "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28464" } ], "notes": [ { "category": "general", "text": "hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28464", "url": "https://www.suse.com/security/cve/CVE-2023-28464" }, { "category": "external", "summary": "SUSE Bug 1209052 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1209052" }, { "category": "external", "summary": "SUSE Bug 1211111 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1211111" }, { "category": "external", "summary": "SUSE Bug 1220130 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1220130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:58:50Z", "details": "important" } ], "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28466" } ], "notes": [ { "category": "general", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28466", "url": "https://www.suse.com/security/cve/CVE-2023-28466" }, { "category": "external", "summary": "SUSE Bug 1209366 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1209366" }, { "category": "external", "summary": "SUSE Bug 1210452 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1210452" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1211833" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-28466", "url": "https://bugzilla.suse.com/1213841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:58:50Z", "details": "important" } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-28772", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28772" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28772", "url": "https://www.suse.com/security/cve/CVE-2023-28772" }, { "category": "external", "summary": "SUSE Bug 1209549 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1209549" }, { "category": "external", "summary": "SUSE Bug 1211110 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1211110" }, { "category": "external", "summary": "SUSE Bug 1214378 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1214378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.124.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.124.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.124.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:58:50Z", "details": "important" } ], "title": "CVE-2023-28772" } ] }
suse-su-2023:2232-1
Vulnerability from csaf_suse
Published
2023-07-06 01:17
Modified
2023-07-06 01:17
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2023-2483: Fixed a use after free bug in emac_remove due caused by a race condition (bsc#1211037).
- CVE-2023-2124: Fixed an out of bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).
- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).
- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).
- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).
- CVE-2020-36691: Fixed a denial of service (unbounded recursion) vulnerability via a nested Netlink policy with a back reference (bsc#1209613 bsc#1209777).
- CVE-2023-0394: Fixed a null pointer dereference flaw in the network subcomponent in the Linux kernel which could lead to system crash (bsc#1207168).
- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).
- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bsc#1194535).
- CVE-2022-20567: Fixed use after free that could lead to a local privilege escalation in pppol2tp_create of l2tp_ppp.c (bsc#1208850).
- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
- CVE-2023-0597: Fixed lack of randomization of per-cpu entry area in x86/mm (bsc#1207845).
- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).
- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).
- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).
- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).
- CVE-2023-1855: Fixed an use-after-free flaw in xgene_hwmon_remove (bsc#1210202).
- CVE-2023-1989: Fixed an use-after-free flaw in btsdio_remove (bsc#1210336).
- CVE-2023-1990: Fixed an use-after-free flaw in ndlc_remove (bsc#1210337).
- CVE-2023-1998: Fixed an use-after-free flaw during login when accessing the shost ipaddress (bsc#1210506).
- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).
- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).
- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/uetooth/hci_conn.c (bsc#1209052).
- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).
- CVE-2023-30772: Fixed race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).
The following non-security bugs were fixed:
- Do not sign the vanilla kernel (bsc#1209008).
- Fix kABI breakage (bsc#1208333)
- PCI: hv: Add a per-bus mutex state_lock (bsc#1207185).
- PCI: hv: Fix a race condition bug in hv_pci_query_relations() (bsc#1207185).
- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207185).
- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207185).
- Remove obsolete KMP obsoletes (bsc#1210469).
- Replace mkinitrd dependency with dracut (bsc#1202353).
- cifs: fix double free in dfs mounts (bsc#1209845).
- cifs: fix negotiate context parsing (bsc#1210301).
- cifs: handle reconnect of tcon when there is no cached dfs referral (bsc#1209845).
- cifs: missing null pointer check in cifs_mount (bsc#1209845).
- cifs: serialize all mount attempts (bsc#1209845).
- cred: allow get_cred() and put_cred() to be given NULL (bsc#1209887).
- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).
- k-m-s: Drop Linux 2.6 support
- kernel-module-subpackage: Fix expansion with -b parameter (bsc#1208179).
Patchnames
SUSE-2023-2232,SUSE-OpenStack-Cloud-9-2023-2232,SUSE-OpenStack-Cloud-Crowbar-9-2023-2232,SUSE-SLE-HA-12-SP4-2023-2232,SUSE-SLE-Live-Patching-12-SP4-2023-2232,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2232,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2232
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2023-2483: Fixed a use after free bug in emac_remove due caused by a race condition (bsc#1211037).\n- CVE-2023-2124: Fixed an out of bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).\n- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).\n- CVE-2017-5753: Fixed spectre V1 vulnerability on netlink (bsc#1209547).\n- CVE-2017-5753: Fixed spectre vulnerability in prlimit (bsc#1209256).\n- CVE-2020-36691: Fixed a denial of service (unbounded recursion) vulnerability via a nested Netlink policy with a back reference (bsc#1209613 bsc#1209777).\n- CVE-2023-0394: Fixed a null pointer dereference flaw in the network subcomponent in the Linux kernel which could lead to system crash (bsc#1207168).\n- CVE-2021-3923: Fixed stack information leak vulnerability that could lead to kernel protection bypass in infiniband RDMA (bsc#1209778).\n- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bsc#1194535).\n- CVE-2022-20567: Fixed use after free that could lead to a local privilege escalation in pppol2tp_create of l2tp_ppp.c (bsc#1208850).\n- CVE-2022-43945: Fixed a buffer overflow in the NFSD implementation (bsc#1205128).\n- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).\n- CVE-2023-0597: Fixed lack of randomization of per-cpu entry area in x86/mm (bsc#1207845).\n- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).\n- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).\n- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).\n- CVE-2023-1390: Fixed remote DoS vulnerability in tipc_link_xmit() (bsc#1209289).\n- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).\n- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).\n- CVE-2023-1855: Fixed an use-after-free flaw in xgene_hwmon_remove (bsc#1210202).\n- CVE-2023-1989: Fixed an use-after-free flaw in btsdio_remove (bsc#1210336).\n- CVE-2023-1990: Fixed an use-after-free flaw in ndlc_remove (bsc#1210337).\n- CVE-2023-1998: Fixed an use-after-free flaw during login when accessing the shost ipaddress (bsc#1210506).\n- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).\n- CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036).\n- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).\n- CVE-2023-28328: Fixed a denial of service issue in az6027 driver in drivers/media/usb/dev-usb/az6027.c (bsc#1209291).\n- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/uetooth/hci_conn.c (bsc#1209052).\n- CVE-2023-28772: Fixed buffer overflow in seq_buf_putmem_hex in lib/seq_buf.c (bsc#1209549).\n- CVE-2023-30772: Fixed race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).\n\nThe following non-security bugs were fixed:\n\n- Do not sign the vanilla kernel (bsc#1209008).\n- Fix kABI breakage (bsc#1208333)\n- PCI: hv: Add a per-bus mutex state_lock (bsc#1207185).\n- PCI: hv: Fix a race condition bug in hv_pci_query_relations() (bsc#1207185).\n- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207185).\n- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207185).\n- Remove obsolete KMP obsoletes (bsc#1210469).\n- Replace mkinitrd dependency with dracut (bsc#1202353).\n- cifs: fix double free in dfs mounts (bsc#1209845).\n- cifs: fix negotiate context parsing (bsc#1210301).\n- cifs: handle reconnect of tcon when there is no cached dfs referral (bsc#1209845).\n- cifs: missing null pointer check in cifs_mount (bsc#1209845).\n- cifs: serialize all mount attempts (bsc#1209845).\n- cred: allow get_cred() and put_cred() to be given NULL (bsc#1209887).\n- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168).\n- k-m-s: Drop Linux 2.6 support\n- kernel-module-subpackage: Fix expansion with -b parameter (bsc#1208179).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2232,SUSE-OpenStack-Cloud-9-2023-2232,SUSE-OpenStack-Cloud-Crowbar-9-2023-2232,SUSE-SLE-HA-12-SP4-2023-2232,SUSE-SLE-Live-Patching-12-SP4-2023-2232,SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2232,SUSE-SLE-SERVER-12-SP4-LTSS-2023-2232", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2232-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2232-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232232-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2232-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" }, { "category": "self", "summary": "SUSE Bug 1076830", "url": "https://bugzilla.suse.com/1076830" }, { "category": "self", "summary": "SUSE Bug 1194535", "url": "https://bugzilla.suse.com/1194535" }, { "category": "self", "summary": "SUSE Bug 1202353", "url": "https://bugzilla.suse.com/1202353" }, { "category": "self", "summary": "SUSE Bug 1205128", "url": "https://bugzilla.suse.com/1205128" }, { "category": "self", "summary": "SUSE Bug 1207036", "url": "https://bugzilla.suse.com/1207036" }, { "category": "self", "summary": "SUSE Bug 1207125", "url": "https://bugzilla.suse.com/1207125" }, { "category": "self", "summary": "SUSE Bug 1207168", "url": "https://bugzilla.suse.com/1207168" }, { "category": "self", "summary": "SUSE Bug 1207185", "url": "https://bugzilla.suse.com/1207185" }, { "category": "self", "summary": "SUSE Bug 1207795", "url": "https://bugzilla.suse.com/1207795" }, { "category": "self", "summary": "SUSE Bug 1207845", "url": "https://bugzilla.suse.com/1207845" }, { "category": "self", "summary": "SUSE Bug 1208179", "url": "https://bugzilla.suse.com/1208179" }, { "category": "self", "summary": "SUSE Bug 1208333", "url": "https://bugzilla.suse.com/1208333" }, { "category": "self", "summary": "SUSE Bug 1208599", "url": "https://bugzilla.suse.com/1208599" }, { "category": "self", "summary": "SUSE Bug 1208777", "url": "https://bugzilla.suse.com/1208777" }, { "category": "self", "summary": "SUSE Bug 1208837", "url": "https://bugzilla.suse.com/1208837" }, { "category": "self", "summary": "SUSE Bug 1208850", "url": "https://bugzilla.suse.com/1208850" }, { "category": "self", "summary": "SUSE Bug 1209008", "url": "https://bugzilla.suse.com/1209008" }, { "category": "self", "summary": "SUSE Bug 1209052", "url": "https://bugzilla.suse.com/1209052" }, { "category": "self", "summary": "SUSE Bug 1209256", "url": "https://bugzilla.suse.com/1209256" }, { "category": "self", "summary": "SUSE Bug 1209289", "url": "https://bugzilla.suse.com/1209289" }, { "category": "self", "summary": "SUSE Bug 1209291", "url": "https://bugzilla.suse.com/1209291" }, { "category": "self", "summary": "SUSE Bug 1209532", "url": "https://bugzilla.suse.com/1209532" }, { "category": "self", "summary": "SUSE Bug 1209547", "url": "https://bugzilla.suse.com/1209547" }, { "category": "self", "summary": "SUSE Bug 1209549", "url": "https://bugzilla.suse.com/1209549" }, { "category": "self", "summary": "SUSE Bug 1209613", "url": "https://bugzilla.suse.com/1209613" }, { "category": "self", "summary": "SUSE Bug 1209687", "url": "https://bugzilla.suse.com/1209687" }, { "category": "self", "summary": "SUSE Bug 1209777", "url": "https://bugzilla.suse.com/1209777" }, { "category": "self", "summary": "SUSE Bug 1209778", "url": "https://bugzilla.suse.com/1209778" }, { "category": "self", "summary": "SUSE Bug 1209845", "url": "https://bugzilla.suse.com/1209845" }, { "category": "self", "summary": "SUSE Bug 1209871", "url": "https://bugzilla.suse.com/1209871" }, { "category": "self", "summary": "SUSE Bug 1209887", "url": "https://bugzilla.suse.com/1209887" }, { "category": "self", "summary": "SUSE Bug 1210124", "url": "https://bugzilla.suse.com/1210124" }, { "category": "self", "summary": "SUSE Bug 1210202", "url": "https://bugzilla.suse.com/1210202" }, { "category": "self", "summary": "SUSE Bug 1210301", "url": "https://bugzilla.suse.com/1210301" }, { "category": "self", "summary": "SUSE Bug 1210329", "url": "https://bugzilla.suse.com/1210329" }, { "category": "self", "summary": "SUSE Bug 1210336", "url": "https://bugzilla.suse.com/1210336" }, { "category": "self", "summary": "SUSE Bug 1210337", "url": "https://bugzilla.suse.com/1210337" }, { "category": "self", "summary": "SUSE Bug 1210469", "url": "https://bugzilla.suse.com/1210469" }, { "category": "self", "summary": "SUSE Bug 1210498", "url": "https://bugzilla.suse.com/1210498" }, { "category": "self", "summary": "SUSE Bug 1210506", "url": "https://bugzilla.suse.com/1210506" }, { "category": "self", "summary": "SUSE Bug 1210647", "url": "https://bugzilla.suse.com/1210647" }, { "category": "self", "summary": "SUSE Bug 1211037", "url": "https://bugzilla.suse.com/1211037" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36691 page", "url": "https://www.suse.com/security/cve/CVE-2020-36691/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3923 page", "url": "https://www.suse.com/security/cve/CVE-2021-3923/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4203 page", "url": "https://www.suse.com/security/cve/CVE-2021-4203/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20567 page", "url": "https://www.suse.com/security/cve/CVE-2022-20567/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-43945 page", "url": "https://www.suse.com/security/cve/CVE-2022-43945/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0394 page", "url": "https://www.suse.com/security/cve/CVE-2023-0394/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0590 page", "url": "https://www.suse.com/security/cve/CVE-2023-0590/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0597 page", "url": "https://www.suse.com/security/cve/CVE-2023-0597/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1076 page", "url": "https://www.suse.com/security/cve/CVE-2023-1076/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1095 page", "url": "https://www.suse.com/security/cve/CVE-2023-1095/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1118 page", "url": "https://www.suse.com/security/cve/CVE-2023-1118/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1390 page", "url": "https://www.suse.com/security/cve/CVE-2023-1390/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1513 page", "url": "https://www.suse.com/security/cve/CVE-2023-1513/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1611 page", "url": "https://www.suse.com/security/cve/CVE-2023-1611/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1670 page", "url": "https://www.suse.com/security/cve/CVE-2023-1670/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1855 page", "url": "https://www.suse.com/security/cve/CVE-2023-1855/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1989 page", "url": "https://www.suse.com/security/cve/CVE-2023-1989/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1990 page", "url": "https://www.suse.com/security/cve/CVE-2023-1990/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1998 page", "url": "https://www.suse.com/security/cve/CVE-2023-1998/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2124 page", "url": "https://www.suse.com/security/cve/CVE-2023-2124/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2162 page", "url": "https://www.suse.com/security/cve/CVE-2023-2162/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23454 page", "url": "https://www.suse.com/security/cve/CVE-2023-23454/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-23455 page", "url": "https://www.suse.com/security/cve/CVE-2023-23455/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2483 page", "url": "https://www.suse.com/security/cve/CVE-2023-2483/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28328 page", "url": "https://www.suse.com/security/cve/CVE-2023-28328/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28464 page", "url": "https://www.suse.com/security/cve/CVE-2023-28464/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-28772 page", "url": "https://www.suse.com/security/cve/CVE-2023-28772/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-30772 page", "url": "https://www.suse.com/security/cve/CVE-2023-30772/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2023-07-06T01:17:55Z", "generator": { "date": "2023-07-06T01:17:55Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2232-1", "initial_release_date": "2023-07-06T01:17:55Z", "revision_history": [ { "date": "2023-07-06T01:17:55Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.125.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.125.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-95.125.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.125.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-95.125.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-95.125.1.aarch64" } }, { "category": "product_version", "name": "drbd-9.0.14+git.62f906cf-4.26.2.aarch64", "product": { "name": "drbd-9.0.14+git.62f906cf-4.26.2.aarch64", "product_id": "drbd-9.0.14+git.62f906cf-4.26.2.aarch64" } }, { "category": "product_version", "name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.aarch64", "product": { "name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.aarch64", "product_id": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.125.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-95.125.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-95.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.125.1.aarch64", "product": { "name": "kernel-default-4.12.14-95.125.1.aarch64", "product_id": "kernel-default-4.12.14-95.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.125.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-95.125.1.aarch64", "product_id": "kernel-default-base-4.12.14-95.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.125.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-95.125.1.aarch64", "product_id": "kernel-default-devel-4.12.14-95.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.125.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-95.125.1.aarch64", "product_id": "kernel-default-extra-4.12.14-95.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.125.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-95.125.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-95.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.125.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.125.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.125.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-95.125.1.aarch64", "product_id": "kernel-obs-build-4.12.14-95.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.125.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-95.125.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-95.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.125.1.aarch64", "product": { "name": "kernel-syms-4.12.14-95.125.1.aarch64", "product_id": "kernel-syms-4.12.14-95.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.125.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-95.125.1.aarch64", "product_id": "kernel-vanilla-4.12.14-95.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.125.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-95.125.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-95.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.125.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.125.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-95.125.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.125.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-95.125.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-95.125.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.125.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.125.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-95.125.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-95.125.1.noarch", "product": { "name": "kernel-devel-4.12.14-95.125.1.noarch", "product_id": "kernel-devel-4.12.14-95.125.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-95.125.1.noarch", "product": { "name": "kernel-docs-4.12.14-95.125.1.noarch", "product_id": "kernel-docs-4.12.14-95.125.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-95.125.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-95.125.1.noarch", "product_id": "kernel-docs-html-4.12.14-95.125.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-95.125.1.noarch", "product": { "name": "kernel-macros-4.12.14-95.125.1.noarch", "product_id": "kernel-macros-4.12.14-95.125.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-95.125.1.noarch", "product": { "name": "kernel-source-4.12.14-95.125.1.noarch", "product_id": "kernel-source-4.12.14-95.125.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-95.125.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-95.125.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-95.125.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.125.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-95.125.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "product": { "name": "drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "product_id": "drbd-9.0.14+git.62f906cf-4.26.2.ppc64le" } }, { "category": "product_version", "name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "product": { "name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "product_id": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.125.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-95.125.1.ppc64le", "product_id": "kernel-debug-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.125.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-95.125.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.125.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-95.125.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.125.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.125.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.125.1.ppc64le", "product": { "name": "kernel-default-4.12.14-95.125.1.ppc64le", "product_id": "kernel-default-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.125.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-95.125.1.ppc64le", "product_id": "kernel-default-base-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.125.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-95.125.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.125.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-95.125.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.125.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-95.125.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.125.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-95.125.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.125.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-95.125.1.ppc64le", "product_id": "kernel-syms-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.125.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-95.125.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.125.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-95.125.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.125.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-95.125.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.125.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-95.125.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-95.125.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-95.125.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.125.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-95.125.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.125.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-95.125.1.s390x", "product_id": "dlm-kmp-default-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "drbd-9.0.14+git.62f906cf-4.26.2.s390x", "product": { "name": "drbd-9.0.14+git.62f906cf-4.26.2.s390x", "product_id": "drbd-9.0.14+git.62f906cf-4.26.2.s390x" } }, { "category": "product_version", "name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "product": { "name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "product_id": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.125.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-95.125.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.125.1.s390x", "product": { "name": "kernel-default-4.12.14-95.125.1.s390x", "product_id": "kernel-default-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.125.1.s390x", "product": { "name": "kernel-default-base-4.12.14-95.125.1.s390x", "product_id": "kernel-default-base-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.125.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-95.125.1.s390x", "product_id": "kernel-default-devel-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.125.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-95.125.1.s390x", "product_id": "kernel-default-extra-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.125.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-95.125.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-95.125.1.s390x", "product": { "name": "kernel-default-man-4.12.14-95.125.1.s390x", "product_id": "kernel-default-man-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.125.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-95.125.1.s390x", "product_id": "kernel-obs-build-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.125.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-95.125.1.s390x", "product_id": "kernel-obs-qa-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.125.1.s390x", "product": { "name": "kernel-syms-4.12.14-95.125.1.s390x", "product_id": "kernel-syms-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.125.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-95.125.1.s390x", "product_id": "kernel-vanilla-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.125.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-95.125.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.125.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-95.125.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-95.125.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-95.125.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-95.125.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-95.125.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "product_id": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.125.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-95.125.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-95.125.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.125.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-95.125.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-95.125.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.125.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-95.125.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "product": { "name": "drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "product_id": "drbd-9.0.14+git.62f906cf-4.26.2.x86_64" } }, { "category": "product_version", "name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "product": { "name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "product_id": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64" } }, { "category": "product_version", "name": "drbd-kmp-rt-9.0.14+git.62f906cf_k4.12.14_3.3-4.26.2.x86_64", "product": { "name": "drbd-kmp-rt-9.0.14+git.62f906cf_k4.12.14_3.3-4.26.2.x86_64", "product_id": "drbd-kmp-rt-9.0.14+git.62f906cf_k4.12.14_3.3-4.26.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.125.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-95.125.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-debug-4.12.14-95.125.1.x86_64", "product_id": "kernel-debug-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-95.125.1.x86_64", "product_id": "kernel-debug-base-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-95.125.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.125.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-default-4.12.14-95.125.1.x86_64", "product_id": "kernel-default-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-95.125.1.x86_64", "product_id": "kernel-default-base-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-95.125.1.x86_64", "product_id": "kernel-default-devel-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-95.125.1.x86_64", "product_id": "kernel-default-extra-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-95.125.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-95.125.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-95.125.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-95.125.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.125.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-95.125.1.x86_64", "product_id": "kernel-obs-build-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-95.125.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-syms-4.12.14-95.125.1.x86_64", "product_id": "kernel-syms-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-95.125.1.x86_64", "product_id": "kernel-vanilla-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-95.125.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.125.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.125.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-95.125.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-95.125.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-95.125.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-ESPOS", "product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-espos:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.125.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.125.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.125.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.125.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.125.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.125.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.125.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.125.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.125.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.125.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.125.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.125.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.125.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.125.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.125.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.125.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.125.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.125.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.125.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.125.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-95.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-95.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-9.0.14+git.62f906cf-4.26.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le" }, "product_reference": "drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-9.0.14+git.62f906cf-4.26.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x" }, "product_reference": "drbd-9.0.14+git.62f906cf-4.26.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-9.0.14+git.62f906cf-4.26.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64" }, "product_reference": "drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le" }, "product_reference": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x" }, "product_reference": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64" }, "product_reference": "drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-95.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-95.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.125.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-ESPOS", "product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.125.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-ESPOS", "product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.125.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-ESPOS", "product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.125.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-ESPOS", "product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.125.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-ESPOS", "product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.125.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-ESPOS", "product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-ESPOS", "product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-ESPOS", "product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-ESPOS", "product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.125.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-ESPOS", "product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.125.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-ESPOS", "product_id": "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.125.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.125.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.125.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.125.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.125.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.125.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.125.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.125.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.125.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.125.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.125.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.125.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2020-36691", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36691" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.8. lib/nlattr.c allows attackers to cause a denial of service (unbounded recursion) via a nested Netlink policy with a back reference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36691", "url": "https://www.suse.com/security/cve/CVE-2020-36691" }, { "category": "external", "summary": "SUSE Bug 1209613 for CVE-2020-36691", "url": "https://bugzilla.suse.com/1209613" }, { "category": "external", "summary": "SUSE Bug 1209777 for CVE-2020-36691", "url": "https://bugzilla.suse.com/1209777" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "moderate" } ], "title": "CVE-2020-36691" }, { "cve": "CVE-2021-3923", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3923" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3923", "url": "https://www.suse.com/security/cve/CVE-2021-3923" }, { "category": "external", "summary": "SUSE Bug 1209778 for CVE-2021-3923", "url": "https://bugzilla.suse.com/1209778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "low" } ], "title": "CVE-2021-3923" }, { "cve": "CVE-2021-4203", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-4203" } ], "notes": [ { "category": "general", "text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-4203", "url": "https://www.suse.com/security/cve/CVE-2021-4203" }, { "category": "external", "summary": "SUSE Bug 1194535 for CVE-2021-4203", "url": "https://bugzilla.suse.com/1194535" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "moderate" } ], "title": "CVE-2021-4203" }, { "cve": "CVE-2022-20567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20567" } ], "notes": [ { "category": "general", "text": "In pppol2tp_create of l2tp_ppp.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-186777253References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20567", "url": "https://www.suse.com/security/cve/CVE-2022-20567" }, { "category": "external", "summary": "SUSE Bug 1208850 for CVE-2022-20567", "url": "https://bugzilla.suse.com/1208850" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "moderate" } ], "title": "CVE-2022-20567" }, { "cve": "CVE-2022-43945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-43945" } ], "notes": [ { "category": "general", "text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-43945", "url": "https://www.suse.com/security/cve/CVE-2022-43945" }, { "category": "external", "summary": "SUSE Bug 1205128 for CVE-2022-43945", "url": "https://bugzilla.suse.com/1205128" }, { "category": "external", "summary": "SUSE Bug 1205130 for CVE-2022-43945", "url": "https://bugzilla.suse.com/1205130" }, { "category": "external", "summary": "SUSE Bug 1208030 for CVE-2022-43945", "url": "https://bugzilla.suse.com/1208030" }, { "category": "external", "summary": "SUSE Bug 1208085 for CVE-2022-43945", "url": "https://bugzilla.suse.com/1208085" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-43945", "url": "https://bugzilla.suse.com/1209225" }, { "category": "external", "summary": "SUSE Bug 1210124 for CVE-2022-43945", "url": "https://bugzilla.suse.com/1210124" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "important" } ], "title": "CVE-2022-43945" }, { "cve": "CVE-2023-0394", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0394" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0394", "url": "https://www.suse.com/security/cve/CVE-2023-0394" }, { "category": "external", "summary": "SUSE Bug 1207168 for CVE-2023-0394", "url": "https://bugzilla.suse.com/1207168" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "moderate" } ], "title": "CVE-2023-0394" }, { "cve": "CVE-2023-0590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0590" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0590", "url": "https://www.suse.com/security/cve/CVE-2023-0590" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207795 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207795" }, { "category": "external", "summary": "SUSE Bug 1207822 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1207822" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1211495" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-0590", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "important" } ], "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0597" } ], "notes": [ { "category": "general", "text": "A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0597", "url": "https://www.suse.com/security/cve/CVE-2023-0597" }, { "category": "external", "summary": "SUSE Bug 1207845 for CVE-2023-0597", "url": "https://bugzilla.suse.com/1207845" }, { "category": "external", "summary": "SUSE Bug 1212395 for CVE-2023-0597", "url": "https://bugzilla.suse.com/1212395" }, { "category": "external", "summary": "SUSE Bug 1213271 for CVE-2023-0597", "url": "https://bugzilla.suse.com/1213271" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "moderate" } ], "title": "CVE-2023-0597" }, { "cve": "CVE-2023-1076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1076" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1076", "url": "https://www.suse.com/security/cve/CVE-2023-1076" }, { "category": "external", "summary": "SUSE Bug 1208599 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1208599" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "moderate" } ], "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1095" } ], "notes": [ { "category": "general", "text": "In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1095", "url": "https://www.suse.com/security/cve/CVE-2023-1095" }, { "category": "external", "summary": "SUSE Bug 1208777 for CVE-2023-1095", "url": "https://bugzilla.suse.com/1208777" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "moderate" } ], "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1118" } ], "notes": [ { "category": "general", "text": "A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1118", "url": "https://www.suse.com/security/cve/CVE-2023-1118" }, { "category": "external", "summary": "SUSE Bug 1208837 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1208837" }, { "category": "external", "summary": "SUSE Bug 1208910 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1208910" }, { "category": "external", "summary": "SUSE Bug 1210423 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1210423" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1211495" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-1118", "url": "https://bugzilla.suse.com/1213842" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "important" } ], "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1390" } ], "notes": [ { "category": "general", "text": "A remote denial of service vulnerability was found in the Linux kernel\u0027s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1390", "url": "https://www.suse.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "SUSE Bug 1209289 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1209289" }, { "category": "external", "summary": "SUSE Bug 1210779 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1210779" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2023-1390", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "important" } ], "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1513" } ], "notes": [ { "category": "general", "text": "A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1513", "url": "https://www.suse.com/security/cve/CVE-2023-1513" }, { "category": "external", "summary": "SUSE Bug 1209532 for CVE-2023-1513", "url": "https://bugzilla.suse.com/1209532" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "low" } ], "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1611" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1611", "url": "https://www.suse.com/security/cve/CVE-2023-1611" }, { "category": "external", "summary": "SUSE Bug 1209687 for CVE-2023-1611", "url": "https://bugzilla.suse.com/1209687" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "moderate" } ], "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1670" } ], "notes": [ { "category": "general", "text": "A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1670", "url": "https://www.suse.com/security/cve/CVE-2023-1670" }, { "category": "external", "summary": "SUSE Bug 1209871 for CVE-2023-1670", "url": "https://bugzilla.suse.com/1209871" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-1670", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "moderate" } ], "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1855" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1855", "url": "https://www.suse.com/security/cve/CVE-2023-1855" }, { "category": "external", "summary": "SUSE Bug 1210202 for CVE-2023-1855", "url": "https://bugzilla.suse.com/1210202" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "moderate" } ], "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1989" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1989", "url": "https://www.suse.com/security/cve/CVE-2023-1989" }, { "category": "external", "summary": "SUSE Bug 1210336 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1210336" }, { "category": "external", "summary": "SUSE Bug 1210500 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1210500" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-1989", "url": "https://bugzilla.suse.com/1214128" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "important" } ], "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1990" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1990", "url": "https://www.suse.com/security/cve/CVE-2023-1990" }, { "category": "external", "summary": "SUSE Bug 1210337 for CVE-2023-1990", "url": "https://bugzilla.suse.com/1210337" }, { "category": "external", "summary": "SUSE Bug 1210501 for CVE-2023-1990", "url": "https://bugzilla.suse.com/1210501" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-1990", "url": "https://bugzilla.suse.com/1214128" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "important" } ], "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1998" } ], "notes": [ { "category": "general", "text": "The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.\n\nThis happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1998", "url": "https://www.suse.com/security/cve/CVE-2023-1998" }, { "category": "external", "summary": "SUSE Bug 1210506 for CVE-2023-1998", "url": "https://bugzilla.suse.com/1210506" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "moderate" } ], "title": "CVE-2023-1998" }, { "cve": "CVE-2023-2124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2124" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2124", "url": "https://www.suse.com/security/cve/CVE-2023-2124" }, { "category": "external", "summary": "SUSE Bug 1210498 for CVE-2023-2124", "url": "https://bugzilla.suse.com/1210498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "moderate" } ], "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2162" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2162", "url": "https://www.suse.com/security/cve/CVE-2023-2162" }, { "category": "external", "summary": "SUSE Bug 1210647 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1210647" }, { "category": "external", "summary": "SUSE Bug 1210662 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1210662" }, { "category": "external", "summary": "SUSE Bug 1213841 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1213841" }, { "category": "external", "summary": "SUSE Bug 1213842 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1213842" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-2162", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "important" } ], "title": "CVE-2023-2162" }, { "cve": "CVE-2023-23454", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23454" } ], "notes": [ { "category": "general", "text": "cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23454", "url": "https://www.suse.com/security/cve/CVE-2023-23454" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207188 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1207188" }, { "category": "external", "summary": "SUSE Bug 1208030 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208030" }, { "category": "external", "summary": "SUSE Bug 1208044 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208044" }, { "category": "external", "summary": "SUSE Bug 1208085 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1208085" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23454", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "important" } ], "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-23455" } ], "notes": [ { "category": "general", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-23455", "url": "https://www.suse.com/security/cve/CVE-2023-23455" }, { "category": "external", "summary": "SUSE Bug 1207036 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207036" }, { "category": "external", "summary": "SUSE Bug 1207125 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207125" }, { "category": "external", "summary": "SUSE Bug 1207189 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1207189" }, { "category": "external", "summary": "SUSE Bug 1211833 for CVE-2023-23455", "url": "https://bugzilla.suse.com/1211833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "important" } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-2483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2483" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-33203. Reason: This candidate is a reservation duplicate of CVE-2023-33203. Notes: All CVE users should reference CVE-2023-33203 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2483", "url": "https://www.suse.com/security/cve/CVE-2023-2483" }, { "category": "external", "summary": "SUSE Bug 1211037 for CVE-2023-2483", "url": "https://bugzilla.suse.com/1211037" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "moderate" } ], "title": "CVE-2023-2483" }, { "cve": "CVE-2023-28328", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28328" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28328", "url": "https://www.suse.com/security/cve/CVE-2023-28328" }, { "category": "external", "summary": "SUSE Bug 1209291 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1209291" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-28328", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "moderate" } ], "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28464" } ], "notes": [ { "category": "general", "text": "hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28464", "url": "https://www.suse.com/security/cve/CVE-2023-28464" }, { "category": "external", "summary": "SUSE Bug 1209052 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1209052" }, { "category": "external", "summary": "SUSE Bug 1211111 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1211111" }, { "category": "external", "summary": "SUSE Bug 1220130 for CVE-2023-28464", "url": "https://bugzilla.suse.com/1220130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "important" } ], "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28772", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-28772" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-28772", "url": "https://www.suse.com/security/cve/CVE-2023-28772" }, { "category": "external", "summary": "SUSE Bug 1209549 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1209549" }, { "category": "external", "summary": "SUSE Bug 1211110 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1211110" }, { "category": "external", "summary": "SUSE Bug 1214378 for CVE-2023-28772", "url": "https://bugzilla.suse.com/1214378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "important" } ], "title": "CVE-2023-28772" }, { "cve": "CVE-2023-30772", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-30772" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-30772", "url": "https://www.suse.com/security/cve/CVE-2023-30772" }, { "category": "external", "summary": "SUSE Bug 1210329 for CVE-2023-30772", "url": "https://bugzilla.suse.com/1210329" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-9.0.14+git.62f906cf-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:drbd-kmp-default-9.0.14+git.62f906cf_k4.12.14_95.125-4.26.2.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_125-default-1-6.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-ESPOS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.125.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.125.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.125.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.125.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-07-06T01:17:55Z", "details": "moderate" } ], "title": "CVE-2023-30772" } ] }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-11-27 23:00
Summary
Dell ECS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell ECS ist ein Objektspeichersystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-27T23:00:00.000+00:00", "generator": { "date": "2024-11-28T11:39:04.623+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-27T23:00:00.000+00:00", "number": "2", "summary": "Produktzuordnung \u00fcberpr\u00fcft" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c3.8.1.0", "product": { "name": "Dell ECS \u003c3.8.1.0", "product_id": "T033919" } }, { "category": "product_version", "name": "3.8.1.0", "product": { "name": "Dell ECS 3.8.1.0", "product_id": "T033919-fixed", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-21626" } ] }
wid-sec-w-2023-0654
Vulnerability from csaf_certbund
Published
2023-03-14 23:00
Modified
2024-05-30 22:00
Summary
Linux Kernel: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0654 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0654.json" }, { "category": "self", "summary": "WID-SEC-2023-0654 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0654" }, { "category": "external", "summary": "Red Hat Bugzilla \u2013 Bug 2178212 vom 2023-03-14", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1801-1 vom 2023-04-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014437.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1800-1 vom 2023-04-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014435.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1803-1 vom 2023-04-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014434.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1811-1 vom 2023-04-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014442.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1848-1 vom 2023-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014466.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1892-1 vom 2023-04-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014489.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1894-1 vom 2023-04-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014488.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5791-2 vom 2023-04-26", "url": "https://ubuntu.com/security/notices/USN-6045-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2232-1 vom 2023-05-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014918.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3190 vom 2023-05-17", "url": "https://access.redhat.com/errata/RHSA-2023:3190" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3191 vom 2023-05-17", "url": "https://access.redhat.com/errata/RHSA-2023:3191" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2660-1 vom 2023-06-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015332.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2690-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015353.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2679-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015351.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2689-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015354.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2666-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015345.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2698-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015362.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2695-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015364.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2681-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015349.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2686-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015356.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2694-1 vom 2023-06-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015352.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2701-1 vom 2023-06-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015369.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2710-1 vom 2023-06-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015377.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2708-1 vom 2023-06-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015379.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2727-1 vom 2023-06-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015386.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2702-1 vom 2023-06-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015381.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2718-1 vom 2023-06-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015374.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2724-1 vom 2023-06-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015385.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2719-1 vom 2023-06-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015372.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2741-1 vom 2023-06-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015389.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2805-1 vom 2023-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4125 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4125" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4146 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4146" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:4126 vom 2023-07-18", "url": "https://access.redhat.com/errata/RHSA-2023:4126" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-058 vom 2024-05-30", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-058.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2024-05-30T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:46:40.801+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0654", "initial_release_date": "2023-03-14T23:00:00.000+00:00", "revision_history": [ { "date": "2023-03-14T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-10T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-11T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-16T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-18T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-26T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE und Red Hat aufgenommen" }, { "date": "2023-06-27T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-06-28T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-06-29T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-02T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-10T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-17T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-05-30T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "14" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c5.11-rc4", "product": { "name": "Open Source Linux Kernel \u003c5.11-rc4", "product_id": "T026736" } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "Im Linux-Kernel besteht eine Schwachstelle bez\u00fcglich des \"TIPC-Kernelmoduls\", wenn dieses einen \"UDP-Bearer\" konfiguriert hat. Wenn das System zwei kleine UDP-Pakete empf\u00e4ngt, versucht \"tipc_link_xmit()\", Elemente zu parsen, die sich nicht in der Warteschlange befinden, was zu einer 100%igen CPU-Auslastung f\u00fchrt. Ein entfernter, anonymer Angreifer kann dies f\u00fcr einen Denial-of-Service-Angriff ausnutzen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T000126", "398363" ] }, "release_date": "2023-03-14T23:00:00.000+00:00", "title": "CVE-2023-1390" } ] }
fkie_cve-2023-1390
Vulnerability from fkie_nvd
Published
2023-03-16 21:15
Modified
2025-04-23 17:16
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5 | Third Party Advisory | |
secalert@redhat.com | https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6 | Patch, Vendor Advisory | |
secalert@redhat.com | https://infosec.exchange/%40_mattata/109427999461122360 | ||
secalert@redhat.com | https://security.netapp.com/advisory/ntap-20230420-0001/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://infosec.exchange/%40_mattata/109427999461122360 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20230420-0001/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | 5.11 | |
linux | linux_kernel | 5.11 | |
linux | linux_kernel | 5.11 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF22C9B4-BCE0-4E42-8C4C-5DAE22C582DE", "versionEndExcluding": "4.9.253", "versionStartIncluding": "4.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D777E229-ADCF-4C7F-A9F7-B2382137F407", "versionEndExcluding": "4.14.217", "versionStartIncluding": "4.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "671B1493-DB61-421B-B0A9-893B3A862EB8", "versionEndExcluding": "4.19.170", "versionStartIncluding": "4.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F6DB7A0-9052-479E-894D-15F862F4D3BF", "versionEndExcluding": "5.4.92", "versionStartIncluding": "4.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAA1C6A6-3B03-4EC3-935C-C9FA0B50DB70", "versionEndExcluding": "5.10.10", "versionStartIncluding": "5.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*", "matchCriteriaId": "18B1C9CE-F7E4-426B-A770-79F86AB5CC38", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*", "matchCriteriaId": "7A70E596-2EF7-4651-B2EF-2CEE31DB6893", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*", "matchCriteriaId": "18C82C96-2853-4DFE-93AD-F6E59B4129CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition." } ], "id": "CVE-2023-1390", "lastModified": "2025-04-23T17:16:25.377", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-03-16T21:15:11.447", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6" }, { "source": "secalert@redhat.com", "url": "https://infosec.exchange/%40_mattata/109427999461122360" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://infosec.exchange/%40_mattata/109427999461122360" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0001/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1050" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
rhsa-2023:4125
Vulnerability from csaf_redhat
Published
2023-07-18 07:48
Modified
2025-08-02 17:51
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
* kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)
* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)
* kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* RHEL8.1 Snapshot3 - PVT:940:virt:4TB:LPM operation failed by returning HSCLA2CF, HSCL365C SRC's - Linux partition suspend timeout (-> documentation/Linux Alert through LTC bug 182549) (BZ#2151218)
* i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (BZ#2171382)
* Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208288)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)\n\n* kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)\n\n* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)\n\n* kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RHEL8.1 Snapshot3 - PVT:940:virt:4TB:LPM operation failed by returning HSCLA2CF, HSCL365C SRC\u0027s - Linux partition suspend timeout (-\u003e documentation/Linux Alert through LTC bug 182549) (BZ#2151218)\n\n* i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (BZ#2171382)\n\n* Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208288)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:4125", "url": "https://access.redhat.com/errata/RHSA-2023:4125" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "2181847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181847" }, { "category": "external", "summary": "2196105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196105" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4125.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T17:51:34+00:00", "generator": { "date": "2025-08-02T17:51:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2023:4125", "initial_release_date": "2023-07-18T07:48:59+00:00", "revision_history": [ { "date": "2023-07-18T07:48:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-07-18T07:48:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T17:51:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:8.2::baseos" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.2::baseos" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:8.2::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "perf-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "perf-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.109.1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.109.1.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-193.109.1.el8_2.src", "product": { "name": "kernel-0:4.18.0-193.109.1.el8_2.src", "product_id": "kernel-0:4.18.0-193.109.1.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.109.1.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.109.1.el8_2?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "product": { "name": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "product_id": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.109.1.el8_2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "perf-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "perf-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.109.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.109.1.el8_2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.109.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src" }, "product_reference": "kernel-0:4.18.0-193.109.1.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "perf-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.109.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src" }, "product_reference": "kernel-0:4.18.0-193.109.1.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "perf-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "perf-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.109.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src" }, "product_reference": "kernel-0:4.18.0-193.109.1.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "perf-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-0461", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-02-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2176192" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/ulp: use-after-free in listening ULP sockets", "title": "Vulnerability summary" }, { "category": "other", "text": "Versions of Red Hat Enterprise Linux before 8 are not affected by this vulnerability as they did not include the upstream commit 734942c (\"tcp: ULP infrastructure\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0461" }, { "category": "external", "summary": "RHBZ#2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0461" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c", "url": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c" } ], "release_date": "2023-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T07:48:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2023:4125" }, { "category": "workaround", "details": "To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net/ulp: use-after-free in listening ULP sockets" }, { "cve": "CVE-2023-1281", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-03-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2181847" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The imperfect hash area can be updated while packets are traversing. This issue could allow a local attacker to cause a use-after-free problem, leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "For the Red Hat Enterprise Linux 7, please use mitigation to disable module cls_tcindex, because some other bugs exists in the Linux Kernel traffic control index filter too that not going to be fixed before Red Hat Enterprise Linux 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1281" }, { "category": "external", "summary": "RHBZ#2181847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181847" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1281", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1281" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1281", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1281" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2" } ], "release_date": "2023-02-23T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T07:48:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2023:4125" }, { "category": "workaround", "details": "This flaw can be mitigated by preventing the affected traffic control index filter (cls_tcindex) kernel module from loading during the boot time, ensure the module is added into the blacklist file.\n~~~\nRefer: \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~", "product_ids": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation" }, { "acknowledgments": [ { "names": [ "Remy" ], "organization": "GreyNoiseIO" } ], "cve": "CVE-2023-1390", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2022-11-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178212" } ], "notes": [ { "category": "description", "text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remote DoS in TIPC kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this issue as they did not include the affected code in `tipc_link_xmit`, introduced in upstream kernel version 4.3 (commit af9b028 \"tipc: make media xmit call outside node spinlock context\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "RHBZ#2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "category": "external", "summary": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "category": "external", "summary": "https://infosec.exchange/@_mattata/109427999461122360", "url": "https://infosec.exchange/@_mattata/109427999461122360" } ], "release_date": "2021-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T07:48:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2023:4125" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remote DoS in TIPC kernel module" }, { "acknowledgments": [ { "names": [ "Patryk Sondej", "Piotr Krysiuk" ] } ], "cve": "CVE-2023-32233", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-05-08T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2196105" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the Netfilter subsystem of the Linux kernel when processing batch requests to update nf_tables configuration. This vulnerability can be abused to perform arbitrary reads and writes in kernel memory. A local user (with CAP_NET_ADMIN capability) could use this flaw to crash the system or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "Only local users with `CAP_NET_ADMIN` capability (or root) can trigger this issue. \nOn Red Hat Enterprise Linux, local unprivileged users can exploit unprivileged user namespaces (CONFIG_USER_NS) to grant themselves this capability.\n\nThe OpenShift Container Platform (OCP) control planes or master machines are based on Red Hat Enterprise Linux CoreOS (RHCOS) that consists primarily of RHEL components, hence is also affected by this kernel vulnerability. Like it is mentioned earlier, the successful exploit needs necessary privileges (CAP_NET_ADMIN) and direct, local access . Local user in RHCOS is already a root with full permissions, hence existence of this vulnerability does not bring any value from the potential attacker perspective. From the OpenShift containers perspective, this vulnerability cannot be exploited as in OpenShift the cluster processes on the node are namespaced, which means that switching in the running OpenShift container the namespace will not bring necessary capabilities.\nThis means that for OpenShift, the impact of this vulnerability is Low.\nSimilar to CVE-2023-32233 vulnerability has been explained in the following blog post as an example of \"Container escape vulnerability\":\nhttps://www.redhat.com/en/blog/containers-vulnerability-risk-assessment", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ], "known_not_affected": [ "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32233" }, { "category": "external", "summary": "RHBZ#2196105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196105" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32233", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32233" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab", "url": "https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2023/05/08/4", "url": "https://www.openwall.com/lists/oss-security/2023/05/08/4" } ], "release_date": "2023-05-02T04:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T07:48:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2023:4125" }, { "category": "workaround", "details": "1. This flaw can be mitigated by preventing the affected netfilter (nf_tables) kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.\n\n2. If the module cannot be disabled, on non-containerized deployments of Red Hat Enterprise Linux, the mitigation is to disable user namespaces:\n```\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n```\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use the second mitigation (disabling user namespaces) as the functionality is needed to be enabled. The first mitigation (blacklisting nf_tables) is still viable for containerized deployments, providing the environment is not using netfilter.", "product_ids": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:bpftool-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.src", "BaseOS-8.2.0.Z.TUS:kernel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-abi-whitelists-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-cross-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-core-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debug-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-devel-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-doc-0:4.18.0-193.109.1.el8_2.noarch", "BaseOS-8.2.0.Z.TUS:kernel-headers-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-modules-extra-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:kernel-tools-libs-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-0:4.18.0-193.109.1.el8_2.x86_64", "BaseOS-8.2.0.Z.TUS:python3-perf-debuginfo-0:4.18.0-193.109.1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation" } ] }
rhsa-2023:3191
Vulnerability from csaf_redhat
Published
2023-05-17 15:27
Modified
2025-08-02 15:51
Summary
Red Hat Security Advisory: kpatch-patch security update
Notes
Topic
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)\n\n* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:3191", "url": "https://access.redhat.com/errata/RHSA-2023:3191" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3191.json" } ], "title": "Red Hat Security Advisory: kpatch-patch security update", "tracking": { "current_release_date": "2025-08-02T15:51:01+00:00", "generator": { "date": "2025-08-02T15:51:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2023:3191", "initial_release_date": "2023-05-17T15:27:55+00:00", "revision_history": [ { "date": "2023-05-17T15:27:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-05-17T15:27:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T15:51:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_76_1@1-4.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_77_1@1-4.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_78_1@1-3.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_80_1@1-2.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_81_1@1-1.el8_1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_76_1@1-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_76_1-debugsource@1-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_76_1-debuginfo@1-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_77_1@1-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_77_1-debugsource@1-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_77_1-debuginfo@1-4.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_78_1@1-3.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_78_1-debugsource@1-3.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_78_1-debuginfo@1-3.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_80_1@1-2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_80_1-debugsource@1-2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_80_1-debuginfo@1-2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_81_1@1-1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_81_1-debugsource@1-1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_81_1-debuginfo@1-1.el8_1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_76_1@1-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_76_1-debugsource@1-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_76_1-debuginfo@1-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_77_1@1-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_77_1-debugsource@1-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_77_1-debuginfo@1-4.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_78_1@1-3.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_78_1-debugsource@1-3.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_78_1-debuginfo@1-3.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_80_1@1-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_80_1-debugsource@1-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_80_1-debuginfo@1-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_81_1@1-1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_81_1-debugsource@1-1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_81_1-debuginfo@1-1.el8_1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-0461", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2176192" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/ulp: use-after-free in listening ULP sockets", "title": "Vulnerability summary" }, { "category": "other", "text": "Versions of Red Hat Enterprise Linux before 8 are not affected by this vulnerability as they did not include the upstream commit 734942c (\"tcp: ULP infrastructure\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0461" }, { "category": "external", "summary": "RHBZ#2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0461" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c", "url": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c" } ], "release_date": "2023-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-17T15:27:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3191" }, { "category": "workaround", "details": "To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net/ulp: use-after-free in listening ULP sockets" }, { "acknowledgments": [ { "names": [ "Remy" ], "organization": "GreyNoiseIO" } ], "cve": "CVE-2023-1390", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2022-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178212" } ], "notes": [ { "category": "description", "text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remote DoS in TIPC kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this issue as they did not include the affected code in `tipc_link_xmit`, introduced in upstream kernel version 4.3 (commit af9b028 \"tipc: make media xmit call outside node spinlock context\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "RHBZ#2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "category": "external", "summary": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "category": "external", "summary": "https://infosec.exchange/@_mattata/109427999461122360", "url": "https://infosec.exchange/@_mattata/109427999461122360" } ], "release_date": "2021-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-17T15:27:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3191" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_76_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debuginfo-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_77_1-debugsource-0:1-4.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_78_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_80_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debuginfo-0:1-1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kpatch-patch-4_18_0-147_81_1-debugsource-0:1-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remote DoS in TIPC kernel module" } ] }
rhsa-2023:4126
Vulnerability from csaf_redhat
Published
2023-07-18 07:48
Modified
2025-08-02 17:52
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
* kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)
* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)
* kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update RT source tree to the RHEL-8.2.z27 source tree (BZ#2209127)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)\n\n* kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)\n\n* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)\n\n* kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.2.z27 source tree (BZ#2209127)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:4126", "url": "https://access.redhat.com/errata/RHSA-2023:4126" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "2181847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181847" }, { "category": "external", "summary": "2196105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196105" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4126.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-02T17:52:05+00:00", "generator": { "date": "2025-08-02T17:52:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2023:4126", "initial_release_date": "2023-07-18T07:48:37+00:00", "revision_history": [ { "date": "2023-07-18T07:48:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-07-18T07:48:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T17:52:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.2::realtime" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.2::nfv" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "product": { "name": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "product_id": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.109.1.rt13.160.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.109.1.rt13.160.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src" }, "product_reference": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV TUS (v. 8.2)", "product_id": "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src" }, "product_reference": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time TUS (v. 8.2)", "product_id": "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-0461", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2176192" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/ulp: use-after-free in listening ULP sockets", "title": "Vulnerability summary" }, { "category": "other", "text": "Versions of Red Hat Enterprise Linux before 8 are not affected by this vulnerability as they did not include the upstream commit 734942c (\"tcp: ULP infrastructure\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0461" }, { "category": "external", "summary": "RHBZ#2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0461" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c", "url": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c" } ], "release_date": "2023-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T07:48:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4126" }, { "category": "workaround", "details": "To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net/ulp: use-after-free in listening ULP sockets" }, { "cve": "CVE-2023-1281", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2181847" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The imperfect hash area can be updated while packets are traversing. This issue could allow a local attacker to cause a use-after-free problem, leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "For the Red Hat Enterprise Linux 7, please use mitigation to disable module cls_tcindex, because some other bugs exists in the Linux Kernel traffic control index filter too that not going to be fixed before Red Hat Enterprise Linux 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1281" }, { "category": "external", "summary": "RHBZ#2181847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181847" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1281", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1281" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1281", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1281" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2" } ], "release_date": "2023-02-23T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T07:48:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4126" }, { "category": "workaround", "details": "This flaw can be mitigated by preventing the affected traffic control index filter (cls_tcindex) kernel module from loading during the boot time, ensure the module is added into the blacklist file.\n~~~\nRefer: \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~", "product_ids": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation" }, { "acknowledgments": [ { "names": [ "Remy" ], "organization": "GreyNoiseIO" } ], "cve": "CVE-2023-1390", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2022-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178212" } ], "notes": [ { "category": "description", "text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remote DoS in TIPC kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this issue as they did not include the affected code in `tipc_link_xmit`, introduced in upstream kernel version 4.3 (commit af9b028 \"tipc: make media xmit call outside node spinlock context\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "RHBZ#2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "category": "external", "summary": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "category": "external", "summary": "https://infosec.exchange/@_mattata/109427999461122360", "url": "https://infosec.exchange/@_mattata/109427999461122360" } ], "release_date": "2021-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T07:48:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4126" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remote DoS in TIPC kernel module" }, { "acknowledgments": [ { "names": [ "Patryk Sondej", "Piotr Krysiuk" ] } ], "cve": "CVE-2023-32233", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2196105" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the Netfilter subsystem of the Linux kernel when processing batch requests to update nf_tables configuration. This vulnerability can be abused to perform arbitrary reads and writes in kernel memory. A local user (with CAP_NET_ADMIN capability) could use this flaw to crash the system or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "Only local users with `CAP_NET_ADMIN` capability (or root) can trigger this issue. \nOn Red Hat Enterprise Linux, local unprivileged users can exploit unprivileged user namespaces (CONFIG_USER_NS) to grant themselves this capability.\n\nThe OpenShift Container Platform (OCP) control planes or master machines are based on Red Hat Enterprise Linux CoreOS (RHCOS) that consists primarily of RHEL components, hence is also affected by this kernel vulnerability. Like it is mentioned earlier, the successful exploit needs necessary privileges (CAP_NET_ADMIN) and direct, local access . Local user in RHCOS is already a root with full permissions, hence existence of this vulnerability does not bring any value from the potential attacker perspective. From the OpenShift containers perspective, this vulnerability cannot be exploited as in OpenShift the cluster processes on the node are namespaced, which means that switching in the running OpenShift container the namespace will not bring necessary capabilities.\nThis means that for OpenShift, the impact of this vulnerability is Low.\nSimilar to CVE-2023-32233 vulnerability has been explained in the following blog post as an example of \"Container escape vulnerability\":\nhttps://www.redhat.com/en/blog/containers-vulnerability-risk-assessment", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32233" }, { "category": "external", "summary": "RHBZ#2196105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196105" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32233", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32233" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab", "url": "https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2023/05/08/4", "url": "https://www.openwall.com/lists/oss-security/2023/05/08/4" } ], "release_date": "2023-05-02T04:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T07:48:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4126" }, { "category": "workaround", "details": "1. This flaw can be mitigated by preventing the affected netfilter (nf_tables) kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.\n\n2. If the module cannot be disabled, on non-containerized deployments of Red Hat Enterprise Linux, the mitigation is to disable user namespaces:\n```\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n```\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use the second mitigation (disabling user namespaces) as the functionality is needed to be enabled. The first mitigation (blacklisting nf_tables) is still viable for containerized deployments, providing the environment is not using netfilter.", "product_ids": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "NFV-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "NFV-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.src", "RT-8.2.0.Z.TUS:kernel-rt-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-core-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debug-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-devel-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-kvm-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64", "RT-8.2.0.Z.TUS:kernel-rt-modules-extra-0:4.18.0-193.109.1.rt13.160.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation" } ] }
rhsa-2021:1578
Vulnerability from csaf_redhat
Published
2021-05-18 15:49
Modified
2025-08-04 12:22
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)
* kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c (CVE-2019-18811)
* kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)
* kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)
* kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)
* kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)
* kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)
* kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)
* kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)
* kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)
* kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)
* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)
* kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)
* kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)
* kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)
* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)
* kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)
* kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)
* kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)
* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (CVE-2020-35508)
* kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations (CVE-2020-36322)
* kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)
* kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c (CVE-2019-18811)\n\n* kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)\n\n* kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)\n\n* kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)\n\n* kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)\n\n* kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)\n\n* kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)\n\n* kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)\n\n* kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)\n\n* kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)\n\n* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)\n\n* kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)\n\n* kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)\n\n* kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)\n\n* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)\n\n* kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)\n\n* kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)\n\n* kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)\n\n* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent (CVE-2020-35508)\n\n* kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations (CVE-2020-36322)\n\n* kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)\n\n* kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1578", "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/" }, { "category": "external", "summary": "1777455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777455" }, { "category": "external", "summary": "1783434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783434" }, { "category": "external", "summary": "1783507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783507" }, { "category": "external", "summary": "1831726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831726" }, { "category": "external", "summary": "1833445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833445" }, { "category": "external", "summary": "1848084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848084" }, { "category": "external", "summary": "1848652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848652" }, { "category": "external", "summary": "1853922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853922" }, { "category": "external", "summary": "1859244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859244" }, { "category": "external", "summary": "1860479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860479" }, { "category": "external", "summary": "1868453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868453" }, { "category": "external", "summary": "1869141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869141" }, { "category": "external", "summary": "1873759", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873759" }, { "category": "external", "summary": "1876840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876840" }, { "category": "external", "summary": "1877575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877575" }, { "category": "external", "summary": "1879981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879981" }, { "category": "external", "summary": "1882591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882591" }, { "category": "external", "summary": "1882594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882594" }, { "category": "external", "summary": "1890373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890373" }, { "category": "external", "summary": "1895961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961" }, { "category": "external", "summary": "1900933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900933" }, { "category": "external", "summary": "1901161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901161" }, { "category": "external", "summary": "1901709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901709" }, { "category": "external", "summary": "1902724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724" }, { "category": "external", "summary": "1903126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903126" }, { "category": "external", "summary": "1903387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903387" }, { "category": "external", "summary": "1903983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903983" }, { "category": "external", "summary": "1911343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911343" }, { "category": "external", "summary": "1915799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915799" }, { "category": "external", "summary": "1919889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919889" }, { "category": "external", "summary": "1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "external", "summary": "1949560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949560" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1578.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-04T12:22:19+00:00", "generator": { "date": "2025-08-04T12:22:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:1578", "initial_release_date": "2021-05-18T15:49:33+00:00", "revision_history": [ { "date": "2021-05-18T15:49:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-18T15:49:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:22:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-305.el8.aarch64", "product": { "name": "bpftool-0:4.18.0-305.el8.aarch64", "product_id": "bpftool-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-0:4.18.0-305.el8.aarch64", "product_id": "kernel-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-core-0:4.18.0-305.el8.aarch64", "product_id": "kernel-core-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-305.el8.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-core-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-devel-0:4.18.0-305.el8.aarch64", "product_id": "kernel-devel-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-headers-0:4.18.0-305.el8.aarch64", "product_id": "kernel-headers-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-modules-0:4.18.0-305.el8.aarch64", "product_id": "kernel-modules-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-305.el8.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-tools-0:4.18.0-305.el8.aarch64", "product_id": "kernel-tools-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-305.el8.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-305.el8.aarch64", "product": { "name": "perf-0:4.18.0-305.el8.aarch64", "product_id": "perf-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-305.el8.aarch64", "product": { "name": "python3-perf-0:4.18.0-305.el8.aarch64", "product_id": "python3-perf-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "perf-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-305.el8.ppc64le", "product": { "name": "bpftool-0:4.18.0-305.el8.ppc64le", "product_id": "bpftool-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-core-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-core-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-devel-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-headers-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-modules-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-tools-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-305.el8.ppc64le", "product": { "name": "perf-0:4.18.0-305.el8.ppc64le", "product_id": "perf-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-305.el8.ppc64le", "product": { "name": "python3-perf-0:4.18.0-305.el8.ppc64le", "product_id": "python3-perf-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-305.el8.x86_64", "product": { "name": "bpftool-0:4.18.0-305.el8.x86_64", "product_id": "bpftool-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-0:4.18.0-305.el8.x86_64", "product_id": "kernel-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-core-0:4.18.0-305.el8.x86_64", "product_id": "kernel-core-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-305.el8.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-core-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-devel-0:4.18.0-305.el8.x86_64", "product_id": "kernel-devel-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-headers-0:4.18.0-305.el8.x86_64", "product_id": "kernel-headers-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-modules-0:4.18.0-305.el8.x86_64", "product_id": "kernel-modules-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-305.el8.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-tools-0:4.18.0-305.el8.x86_64", "product_id": "kernel-tools-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-305.el8.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-305.el8.x86_64", "product": { "name": "perf-0:4.18.0-305.el8.x86_64", "product_id": "perf-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-305.el8.x86_64", "product": { "name": "python3-perf-0:4.18.0-305.el8.x86_64", "product_id": "python3-perf-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "perf-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-305.el8.s390x", "product": { "name": "bpftool-0:4.18.0-305.el8.s390x", "product_id": "bpftool-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-0:4.18.0-305.el8.s390x", "product_id": "kernel-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-core-0:4.18.0-305.el8.s390x", "product_id": "kernel-core-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-305.el8.s390x", "product_id": "kernel-cross-headers-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-core-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-devel-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-modules-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-devel-0:4.18.0-305.el8.s390x", "product_id": "kernel-devel-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-headers-0:4.18.0-305.el8.s390x", "product_id": "kernel-headers-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-modules-0:4.18.0-305.el8.s390x", "product_id": "kernel-modules-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-305.el8.s390x", "product_id": "kernel-modules-extra-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-tools-0:4.18.0-305.el8.s390x", "product_id": "kernel-tools-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-305.el8.s390x", "product": { "name": "perf-0:4.18.0-305.el8.s390x", "product_id": "perf-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-305.el8.s390x", "product": { "name": "python3-perf-0:4.18.0-305.el8.s390x", "product_id": "python3-perf-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "kernel-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "perf-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-305.el8.src", "product": { "name": "kernel-0:4.18.0-305.el8.src", "product_id": "kernel-0:4.18.0-305.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-305.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "product": { "name": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "product_id": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.el8?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-305.el8.noarch", "product": { "name": "kernel-doc-0:4.18.0-305.el8.noarch", "product_id": "kernel-doc-0:4.18.0-305.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src" }, "product_reference": "kernel-0:4.18.0-305.el8.src", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch" }, "product_reference": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-305.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-305.el8.noarch", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64" }, "product_reference": "perf-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x" }, "product_reference": "perf-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64" }, "product_reference": "perf-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src" }, "product_reference": "kernel-0:4.18.0-305.el8.src", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch" }, "product_reference": "kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-305.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-305.el8.noarch", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64" }, "product_reference": "perf-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x" }, "product_reference": "perf-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64" }, "product_reference": "perf-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "relates_to_product_reference": "CRB-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "relates_to_product_reference": "CRB-8.4.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-18811", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-10-28T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1777455" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s\r\nsof_set_get_large_ctrl_data function, in the way it handled memory cleanup in a specific error path. A local attacker could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18811" }, { "category": "external", "summary": "RHBZ#1777455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1777455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18811", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18811" } ], "release_date": "2019-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "As the snd-sof module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install snd-sof /bin/true\" \u003e\u003e /etc/modprobe.d/disable-snd-sof.conf\n\nThe system will need to be restarted if the snd-sof module is already loaded. In most circumstances, the snd-sof kernel module will be unable to be unloaded while the device is in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c" }, { "cve": "CVE-2019-19523", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783434" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation for ADU devices from Ontrak Control Systems, where an attacker with administrative privileges and access to a local account could pre-groom the memory and physically disconnect or unload a module. The attacker must be able to access either of these two events to trigger the use-after-free, and then race the access to the use-after-free, to create a situation where key USB structs can be manipulated into corrupting memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19523" }, { "category": "external", "summary": "RHBZ#1783434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783434" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19523", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19523" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19523", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19523" } ], "release_date": "2019-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "As the system module will be auto-loaded when a device that uses the driver is attached (via USB), its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install adutux /bin/true\" \u003e\u003e /etc/modprobe.d/disable-adutux.conf\n \nThe system will need to be restarted if the adutux module are loaded. In most circumstances, the kernel modules will be unable to be unloaded while any hardware is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver" }, { "cve": "CVE-2019-19528", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783507" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in iowarrior_disconnect in iowarrior USB driver module were a flag was simultaneously modified causing a race between a device open and disconnect. This flaw could allow a physical attacker to cause a denial of service (DoS) attack. This vulnerability could even lead to a kernel information leak problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19528" }, { "category": "external", "summary": "RHBZ#1783507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783507" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19528", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19528" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19528", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19528" } ], "release_date": "2019-10-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "This flaw can be mitigated by preventing the affected USB IO-Warrior driver (iowarrior) kernel module from loading during the boot time, ensure the module is added into the blacklist file.\n~~~\nRefer: \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver" }, { "cve": "CVE-2020-0431", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2021-01-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919889" } ], "notes": [ { "category": "description", "text": "A flaw out of bounds write in the Linux kernel human interface devices subsystem was found in the way user calls find key code by index. A local user could use this flaw to crash the system or escalate privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible out of bounds write in kbd_keycode of keyboard.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "RHBZ#1919889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919889" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0431", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0431" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0431", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0431" }, { "category": "external", "summary": "https://patchwork.kernel.org/project/linux-input/patch/20191207210518.GA181006@dtor-ws/", "url": "https://patchwork.kernel.org/project/linux-input/patch/20191207210518.GA181006@dtor-ws/" } ], "release_date": "2021-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible out of bounds write in kbd_keycode of keyboard.c" }, { "cve": "CVE-2020-11608", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-04-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1833445" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the ov519 driver in the Linux kernel handled certain types of USB descriptors. This flaw allows an attacker with the ability to induce the error conditions to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the issue (physical access).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11608" }, { "category": "external", "summary": "RHBZ#1833445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833445" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11608", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11608" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11608", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11608" } ], "release_date": "2020-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module gspca_ov519. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c" }, { "cve": "CVE-2020-12114", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-05-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848652" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the pivot_root syscall. This flaw allows a local privileged user (root outside or root inside a privileged container) to exploit a race condition to manipulate the reference count of the root filesystem. To be able to abuse this flaw, the process or user calling pivot_root must have advanced permissions. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: DoS by corrupting mountpoint reference counter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "RHBZ#1848652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12114", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114" } ], "release_date": "2020-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: DoS by corrupting mountpoint reference counter" }, { "cve": "CVE-2020-12362", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-02-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930246" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8) print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12362" }, { "category": "external", "summary": "RHBZ#1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12363", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930249" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Improper input validation in some Intel(R) Graphics Drivers may allow a privileged user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper input validation in some Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12363" }, { "category": "external", "summary": "RHBZ#1930249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12363", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper input validation in some Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12364", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930251" } ], "notes": [ { "category": "description", "text": "Null pointer reference in some Intel(R) Graphics Drivers for Microsoft Windows and the Linux kernel may allow a privileged user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12364" }, { "category": "external", "summary": "RHBZ#1930251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12364", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12464", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-04-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1831726" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in usb_sg_cancel in drivers/usb/core/message.c in the USB core subsystem. This flaw allows a local attacker with a special user or root privileges to crash the system due to a race problem in the scatter-gather cancellation and transfer completion in usb_sg_wait. This vulnerability can also lead to a leak of internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "RHBZ#1831726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12464", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12464" } ], "release_date": "2020-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c" }, { "acknowledgments": [ { "names": [ "Jay Shin" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-14314", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-06-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853922" } ], "notes": [ { "category": "description", "text": "A memory out-of-bounds read flaw was found in the Linux kernel\u0027s ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer uses out of index in ext3/4 filesystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "RHBZ#1853922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853922" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14314", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14314" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14314", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14314" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1" }, { "category": "external", "summary": "https://lore.kernel.org/linux-ext4/f53e246b-647c-64bb-16ec-135383c70ad7@redhat.com/T/#u", "url": "https://lore.kernel.org/linux-ext4/f53e246b-647c-64bb-16ec-135383c70ad7@redhat.com/T/#u" } ], "release_date": "2020-06-05T16:45:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "If any directories of the partition (or image) broken, the command \"e2fsck -Df .../partition-name\" fixes it.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer uses out of index in ext3/4 filesystem" }, { "acknowledgments": [ { "names": [ "Adam Zabrocki" ], "organization": "pi3.com.pl" } ], "cve": "CVE-2020-14356", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-07-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868453" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s cgroupv2 subsystem when rebooting the system. This flaw allows a local user to crash the system or escalate their privileges. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use After Free vulnerability in cgroup BPF component", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because only local user can trigger it and no way to trigger it before reboot happens (until user have complete privileges for accessing cgroupv2).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "RHBZ#1868453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14356", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14356" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14356", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14356" } ], "release_date": "2020-05-31T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use After Free vulnerability in cgroup BPF component" }, { "acknowledgments": [ { "names": [ "Yang Yingliang" ] } ], "cve": "CVE-2020-15437", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-11-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901161" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s UART 8250 functionality, in the way certain hardware architectures handled situations where default ports (0x2E8, 0x2F8, 0x3E8, 0x3F8) are not available. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because the issue can only be triggered by an authorized local user in the tty or in the dialout group.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15437" }, { "category": "external", "summary": "RHBZ#1901161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15437", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15437" } ], "release_date": "2020-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c" }, { "cve": "CVE-2020-24394", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2020-06-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1869141" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in NFSv4.2 in the Linux kernel, where a server fails to correctly apply umask when creating a new object on filesystem without ACL support (for example, ext4 with the \"noacl\" mount option). This flaw allows a local attacker with a user privilege to cause a kernel information leak problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: umask not applied on filesystem without ACL support", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24394" }, { "category": "external", "summary": "RHBZ#1869141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24394", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24394" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24394", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24394" } ], "release_date": "2020-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: umask not applied on filesystem without ACL support" }, { "cve": "CVE-2020-25212", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2020-09-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1877575" } ], "notes": [ { "category": "description", "text": "A flaw was found in the NFSv4 implementation where when mounting a remote attacker controlled server it could return specially crafted response allow for local memory corruption and possibly privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TOCTOU mismatch in the NFS client code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "RHBZ#1877575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25212", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25212" } ], "release_date": "2020-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "While there is no known mitigation to this flaw, configuring authentication and only mounting authenticated NFSv4 servers will significantly reduce the risk of this flaw being successfully exploited.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: TOCTOU mismatch in the NFS client code" }, { "cve": "CVE-2020-25284", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2020-09-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882594" } ], "notes": [ { "category": "description", "text": "A flaw was found in the capabilities check of the rados block device functionality in the Linux kernel. Incorrect capability checks could alllow a local user with root priviledges (but no capabilities) to add or remove Rados Block Devices from the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: incomplete permission checking for access to rbd devices", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "RHBZ#1882594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882594" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25284", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25284" } ], "release_date": "2020-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "As the rbd module can be loaded by a priviledged user or process, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install rbd /bin/true\" \u003e\u003e /etc/modprobe.d/disable-rdb.conf \n \nThe system will need to be restarted if the modules isloaded. In most circumstances, the rbd kernel modules will be unable to be unloaded while in use.\n\nIf the system requires this module to work correctly, (Such as a CEPH node) this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: incomplete permission checking for access to rbd devices" }, { "cve": "CVE-2020-25285", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-09-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882591" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels sysctl handling code for hugepages management. When multiple root level processes would write to modify the /proc/sys/vm/nr_hugepages file it could create a race on internal variables leading to a system crash or memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact as access to write to /proc/sys/vm/nr_hugepages is restricted to root and not available to regular users.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "RHBZ#1882591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882591" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25285", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25285" } ], "release_date": "2020-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c" }, { "acknowledgments": [ { "names": [ "ChenNan Of Chaitin" ], "organization": "Security Research Lab" } ], "cve": "CVE-2020-25643", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-09-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879981" } ], "notes": [ { "category": "description", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because the bug can be triggered only if PPP protocol enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "RHBZ#1879981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879981" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25643", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25643" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105" } ], "release_date": "2020-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "To mitigate this issue, prevent modules hdlc_ppp, syncppp from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow" }, { "cve": "CVE-2020-25704", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2020-11-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1895961" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the Linux kernel\u2019s performance monitoring subsystem when using PERF_EVENT_IOC_SET_FILTER. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: perf_event_parse_addr_filter memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "RHBZ#1895961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25704", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25704" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/11/09/1", "url": "https://www.openwall.com/lists/oss-security/2020/11/09/1" } ], "release_date": "2020-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: perf_event_parse_addr_filter memory" }, { "cve": "CVE-2020-27786", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1900933" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in kernel midi subsystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27786" }, { "category": "external", "summary": "RHBZ#1900933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27786", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27786" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d" } ], "release_date": "2020-12-02T02:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "As the midi module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install snd-rawmidi /bin/true\" \u003e\u003e /etc/modprobe.d/disable-snd-rawmidi.conf\n\nThe system will need to be restarted if the snd-rawmidi modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while any midi / sound devices are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in kernel midi subsystem" }, { "cve": "CVE-2020-27835", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-10-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901709" } ], "notes": [ { "category": "description", "text": "A flaw use after free in the Linux kernel infiniband hfi1 driver was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: child process is able to access parent mm through hfi dev file handle", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because the issue can only be triggered by an authorized local user with access to a system with specific hardware present.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27835" }, { "category": "external", "summary": "RHBZ#1901709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901709" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27835", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27835" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27835", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27835" } ], "release_date": "2020-11-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module hfi1 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to denylist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: child process is able to access parent mm through hfi dev file handle" }, { "acknowledgments": [ { "names": [ "Yuan Ming \u003cyuanmingbuaa@gmail com\u003e" ], "organization": "Tsinghua University" } ], "cve": "CVE-2020-28974", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903126" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) SLAB memory access flaw was found in the Linux kernel\u0027s fbcon driver module. A bounds check failure allows a local attacker with special user privileges to gain access to out-of-bounds memory, leading to a system crash or leaking of internal kernel information. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: slab-out-of-bounds read in fbcon", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28974" }, { "category": "external", "summary": "RHBZ#1903126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903126" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28974", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28974" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28974", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28974" } ], "release_date": "2020-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Add \u0027nomodeset\u0027 option as kernel boot parameter to disable frame buffering in /etc/default/grub, and run \u0027grub2-mkconfig -o /boot/grub2/grub.cfg\u0027 and reboot.\n~~~\n# cat /proc/cmdline \nBOOT_IMAGE=(hd0,msdos1)/vmlinuz-4.18.0-147.el8.x86_64 root=/dev/mapper/rhel_rhel8u2--1-root ro crashkernel=auto resume=/dev/mapper/rhel_rhel8u2--1-swap rd.lvm.lv=rhel_rhel8u2-1/root rd.lvm.lv=rhel_rhel8u2-1/swap nomodeset\n\n# ls -l /dev/fb*\nls: cannot access \u0027/dev/fb*\u0027: No such file or directory\n~~~\n\nThe above said mitigation does not so effect for rhel6 kernel , and is only applicable for rhel7/8.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: slab-out-of-bounds read in fbcon" }, { "acknowledgments": [ { "names": [ "Eddy Wu" ], "organization": "trendmicro.com" } ], "cve": "CVE-2020-35508", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "discovery_date": "2020-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1902724" } ], "notes": [ { "category": "description", "text": "A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent", "title": "Vulnerability summary" }, { "category": "other", "text": "The incorrect initialization of the process id affects Red Hat Enterprise Linux only.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35508" }, { "category": "external", "summary": "RHBZ#1902724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35508", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35508" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508" } ], "release_date": "2020-12-09T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent" }, { "cve": "CVE-2020-36322", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-04-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1949560" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in fuse_do_getattr in fs/fuse/dir.c in the kernel side of the FUSE filesystem in the Linux kernel. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affected Linux kernel versions as shipped with Red Hat Enterprise Linux from 8.3 and prior the versions. RHEL 8.4 and later versions are not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36322" }, { "category": "external", "summary": "RHBZ#1949560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949560" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36322", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36322" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36322", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36322" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d069dbe8aaf2a197142558b6fb2978189ba3454", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d069dbe8aaf2a197142558b6fb2978189ba3454" } ], "release_date": "2020-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations" }, { "cve": "CVE-2020-36557", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-07-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2112688" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s Virtual Terminal subsystem in how a user calls the VT_DISALLOCATE ioctl during the closing/opening of ttys. This flaw allows a local user to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys, causing a use-after-free in con_shutdown().", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36557" }, { "category": "external", "summary": "RHBZ#2112688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36557", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36557" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ca4463bf8438b403596edd0ec961ca0d4fbe0220", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ca4463bf8438b403596edd0ec961ca0d4fbe0220" } ], "release_date": "2020-03-21T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition between the VT_DISALLOCATE ioctl and closing/opening of ttys, causing a use-after-free in con_shutdown()." }, { "cve": "CVE-2020-36694", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2212140" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the packet processing context in net/netfilter/x_tables.c in netfilter in the Linux Kernel. This issue occurs when the per-CPU sequence count is mishandled during concurrent iptables rules replacement and can be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: use-after-free in the packet processing context", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36694" }, { "category": "external", "summary": "RHBZ#2212140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36694", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36694" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c" } ], "release_date": "2023-05-22T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: netfilter: use-after-free in the packet processing context" }, { "cve": "CVE-2021-0342", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-13T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1915799" } ], "notes": [ { "category": "description", "text": "A flaw use after free in the Linux kernel TUN/TAP device driver functionality was found in the way user create and use tun/tap device. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges and non-standard configuration of the networking device.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0342" }, { "category": "external", "summary": "RHBZ#1915799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915799" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0342", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0342" }, { "category": "external", "summary": "https://lore.kernel.org/netdev/20200608230607.3361041-84-sashal@kernel.org/", "url": "https://lore.kernel.org/netdev/20200608230607.3361041-84-sashal@kernel.org/" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module tun from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege" }, { "cve": "CVE-2021-0605", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-06-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1974823" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s pfkey_dump function trusted the provided filter size parameters. A local, sufficiently privileged user could use this flaw to leak information from the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0605" }, { "category": "external", "summary": "RHBZ#1974823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0605", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0605" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0605", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0605" } ], "release_date": "2021-06-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "If the CAP_NET_ADMIN capability is privileged by default (which is true for Red Hat Enterprise Linux 7), then only an otherwise privileged user can trigger this bug. \n\nOn Red Hat Enterprise Linux 8 CAP_NET_ADMIN capability can be also gained by exploiting unprivileged user namespaces. The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds" }, { "cve": "CVE-2021-3428", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-01-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1936786" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: integer overflow in ext4_es_cache_extent", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3428" }, { "category": "external", "summary": "RHBZ#1936786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3428", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3428" } ], "release_date": "2021-01-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: integer overflow in ext4_es_cache_extent" }, { "acknowledgments": [ { "names": [ "Remy" ], "organization": "GreyNoiseIO" } ], "cve": "CVE-2023-1390", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2022-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178212" } ], "notes": [ { "category": "description", "text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remote DoS in TIPC kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this issue as they did not include the affected code in `tipc_link_xmit`, introduced in upstream kernel version 4.3 (commit af9b028 \"tipc: make media xmit call outside node spinlock context\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "RHBZ#2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "category": "external", "summary": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "category": "external", "summary": "https://infosec.exchange/@_mattata/109427999461122360", "url": "https://infosec.exchange/@_mattata/109427999461122360" } ], "release_date": "2021-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:49:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1578" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "BaseOS-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "BaseOS-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:bpftool-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.src", "CRB-8.4.0.GA:kernel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-abi-stablelists-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-cross-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-core-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debug-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-doc-0:4.18.0-305.el8.noarch", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-headers-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-modules-extra-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-tools-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:kernel-tools-libs-devel-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:kernel-zfcpdump-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-core-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-devel-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:perf-debuginfo-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-0:4.18.0-305.el8.x86_64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.aarch64", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.ppc64le", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.s390x", "CRB-8.4.0.GA:python3-perf-debuginfo-0:4.18.0-305.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remote DoS in TIPC kernel module" } ] }
rhsa-2023:4146
Vulnerability from csaf_redhat
Published
2023-07-18 09:03
Modified
2025-08-02 17:50
Summary
Red Hat Security Advisory: kpatch-patch security update
Notes
Topic
An update for kpatch-patch-4_18_0-193_100_1, kpatch-patch-4_18_0-193_105_1, kpatch-patch-4_18_0-193_95_1, and kpatch-patch-4_18_0-193_98_1 is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
* kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)
* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)
* kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kpatch-patch-4_18_0-193_100_1, kpatch-patch-4_18_0-193_105_1, kpatch-patch-4_18_0-193_95_1, and kpatch-patch-4_18_0-193_98_1 is now available for Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)\n\n* kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)\n\n* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)\n\n* kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:4146", "url": "https://access.redhat.com/errata/RHSA-2023:4146" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "2181847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181847" }, { "category": "external", "summary": "2196105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196105" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4146.json" } ], "title": "Red Hat Security Advisory: kpatch-patch security update", "tracking": { "current_release_date": "2025-08-02T17:50:54+00:00", "generator": { "date": "2025-08-02T17:50:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2023:4146", "initial_release_date": "2023-07-18T09:03:53+00:00", "revision_history": [ { "date": "2023-07-18T09:03:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-07-18T09:03:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T17:50:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.2::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_95_1@1-4.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_98_1@1-3.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_100_1@1-2.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_105_1@1-1.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_95_1@1-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_95_1-debugsource@1-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_95_1-debuginfo@1-4.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_98_1@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_98_1-debugsource@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_98_1-debuginfo@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_100_1@1-2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_100_1-debugsource@1-2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_100_1-debuginfo@1-2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_105_1@1-1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_105_1-debugsource@1-1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_105_1-debuginfo@1-1.el8_2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_95_1@1-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_95_1-debugsource@1-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_95_1-debuginfo@1-4.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_98_1@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_98_1-debugsource@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_98_1-debuginfo@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_100_1@1-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_100_1-debugsource@1-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_100_1-debuginfo@1-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_105_1@1-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_105_1-debugsource@1-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_105_1-debuginfo@1-1.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-0461", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2176192" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/ulp: use-after-free in listening ULP sockets", "title": "Vulnerability summary" }, { "category": "other", "text": "Versions of Red Hat Enterprise Linux before 8 are not affected by this vulnerability as they did not include the upstream commit 734942c (\"tcp: ULP infrastructure\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0461" }, { "category": "external", "summary": "RHBZ#2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0461" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c", "url": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c" } ], "release_date": "2023-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T09:03:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4146" }, { "category": "workaround", "details": "To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net/ulp: use-after-free in listening ULP sockets" }, { "cve": "CVE-2023-1281", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2181847" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The imperfect hash area can be updated while packets are traversing. This issue could allow a local attacker to cause a use-after-free problem, leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "For the Red Hat Enterprise Linux 7, please use mitigation to disable module cls_tcindex, because some other bugs exists in the Linux Kernel traffic control index filter too that not going to be fixed before Red Hat Enterprise Linux 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1281" }, { "category": "external", "summary": "RHBZ#2181847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181847" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1281", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1281" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1281", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1281" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2" } ], "release_date": "2023-02-23T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T09:03:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4146" }, { "category": "workaround", "details": "This flaw can be mitigated by preventing the affected traffic control index filter (cls_tcindex) kernel module from loading during the boot time, ensure the module is added into the blacklist file.\n~~~\nRefer: \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~", "product_ids": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation" }, { "acknowledgments": [ { "names": [ "Remy" ], "organization": "GreyNoiseIO" } ], "cve": "CVE-2023-1390", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2022-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178212" } ], "notes": [ { "category": "description", "text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remote DoS in TIPC kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this issue as they did not include the affected code in `tipc_link_xmit`, introduced in upstream kernel version 4.3 (commit af9b028 \"tipc: make media xmit call outside node spinlock context\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "RHBZ#2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "category": "external", "summary": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "category": "external", "summary": "https://infosec.exchange/@_mattata/109427999461122360", "url": "https://infosec.exchange/@_mattata/109427999461122360" } ], "release_date": "2021-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T09:03:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4146" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remote DoS in TIPC kernel module" }, { "acknowledgments": [ { "names": [ "Patryk Sondej", "Piotr Krysiuk" ] } ], "cve": "CVE-2023-32233", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2196105" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the Netfilter subsystem of the Linux kernel when processing batch requests to update nf_tables configuration. This vulnerability can be abused to perform arbitrary reads and writes in kernel memory. A local user (with CAP_NET_ADMIN capability) could use this flaw to crash the system or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "Only local users with `CAP_NET_ADMIN` capability (or root) can trigger this issue. \nOn Red Hat Enterprise Linux, local unprivileged users can exploit unprivileged user namespaces (CONFIG_USER_NS) to grant themselves this capability.\n\nThe OpenShift Container Platform (OCP) control planes or master machines are based on Red Hat Enterprise Linux CoreOS (RHCOS) that consists primarily of RHEL components, hence is also affected by this kernel vulnerability. Like it is mentioned earlier, the successful exploit needs necessary privileges (CAP_NET_ADMIN) and direct, local access . Local user in RHCOS is already a root with full permissions, hence existence of this vulnerability does not bring any value from the potential attacker perspective. From the OpenShift containers perspective, this vulnerability cannot be exploited as in OpenShift the cluster processes on the node are namespaced, which means that switching in the running OpenShift container the namespace will not bring necessary capabilities.\nThis means that for OpenShift, the impact of this vulnerability is Low.\nSimilar to CVE-2023-32233 vulnerability has been explained in the following blog post as an example of \"Container escape vulnerability\":\nhttps://www.redhat.com/en/blog/containers-vulnerability-risk-assessment", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32233" }, { "category": "external", "summary": "RHBZ#2196105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196105" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32233", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32233" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32233" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab", "url": "https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2023/05/08/4", "url": "https://www.openwall.com/lists/oss-security/2023/05/08/4" } ], "release_date": "2023-05-02T04:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T09:03:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4146" }, { "category": "workaround", "details": "1. This flaw can be mitigated by preventing the affected netfilter (nf_tables) kernel module from being loaded. For instructions on how to blacklist a kernel module, please see https://access.redhat.com/solutions/41278.\n\n2. If the module cannot be disabled, on non-containerized deployments of Red Hat Enterprise Linux, the mitigation is to disable user namespaces:\n```\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n```\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use the second mitigation (disabling user namespaces) as the functionality is needed to be enabled. The first mitigation (blacklisting nf_tables) is still viable for containerized deployments, providing the environment is not using netfilter.", "product_ids": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_100_1-debugsource-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debuginfo-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_105_1-debugsource-0:1-1.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debuginfo-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_95_1-debugsource-0:1-4.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.E4S:kpatch-patch-4_18_0-193_98_1-debugsource-0:1-3.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation" } ] }
rhsa-2021:1739
Vulnerability from csaf_redhat
Published
2021-05-18 16:07
Modified
2025-08-04 12:22
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)
* kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)
* kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)
* kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)
* kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)
* kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)
* kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)
* kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)
* kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)
* kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)
* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)
* kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)
* kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)
* kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)
* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)
* kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)
* kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)
* kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)
* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent (CVE-2020-35508)
* kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)
* kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)\n\n* kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver (CVE-2019-19523)\n\n* kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (CVE-2019-19528)\n\n* kernel: possible out of bounds write in kbd_keycode of keyboard.c (CVE-2020-0431)\n\n* kernel: DoS by corrupting mountpoint reference counter (CVE-2020-12114)\n\n* kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c (CVE-2020-12464)\n\n* kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314)\n\n* kernel: Use After Free vulnerability in cgroup BPF component (CVE-2020-14356)\n\n* kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c (CVE-2020-15437)\n\n* kernel: umask not applied on filesystem without ACL support (CVE-2020-24394)\n\n* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212)\n\n* kernel: incomplete permission checking for access to rbd devices (CVE-2020-25284)\n\n* kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c (CVE-2020-25285)\n\n* kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)\n\n* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704)\n\n* kernel: use-after-free in kernel midi subsystem (CVE-2020-27786)\n\n* kernel: child process is able to access parent mm through hfi dev file handle (CVE-2020-27835)\n\n* kernel: slab-out-of-bounds read in fbcon (CVE-2020-28974)\n\n* kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent (CVE-2020-35508)\n\n* kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege (CVE-2021-0342)\n\n* kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c (CVE-2020-11608)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1739", "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/" }, { "category": "external", "summary": "1783434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783434" }, { "category": "external", "summary": "1783507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783507" }, { "category": "external", "summary": "1831726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831726" }, { "category": "external", "summary": "1833445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833445" }, { "category": "external", "summary": "1848652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848652" }, { "category": "external", "summary": "1853922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853922" }, { "category": "external", "summary": "1868453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868453" }, { "category": "external", "summary": "1869141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869141" }, { "category": "external", "summary": "1877575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877575" }, { "category": "external", "summary": "1879981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879981" }, { "category": "external", "summary": "1882591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882591" }, { "category": "external", "summary": "1882594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882594" }, { "category": "external", "summary": "1886109", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886109" }, { "category": "external", "summary": "1894793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894793" }, { "category": "external", "summary": "1895961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961" }, { "category": "external", "summary": "1896842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896842" }, { "category": "external", "summary": "1897869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897869" }, { "category": "external", "summary": "1900933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900933" }, { "category": "external", "summary": "1901161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901161" }, { "category": "external", "summary": "1901709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901709" }, { "category": "external", "summary": "1902724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724" }, { "category": "external", "summary": "1903126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903126" }, { "category": "external", "summary": "1915799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915799" }, { "category": "external", "summary": "1919889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919889" }, { "category": "external", "summary": "1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1739.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-04T12:22:29+00:00", "generator": { "date": "2025-08-04T12:22:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:1739", "initial_release_date": "2021-05-18T16:07:21+00:00", "revision_history": [ { "date": "2021-05-18T16:07:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-18T16:07:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:22:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.src", "product": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.src", "product_id": "kernel-rt-0:4.18.0-305.rt7.72.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.rt7.72.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.rt7.72.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.rt7.72.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-305.rt7.72.el8.src", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "NFV-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-305.rt7.72.el8.src", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "relates_to_product_reference": "RT-8.4.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19523", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783434" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation for ADU devices from Ontrak Control Systems, where an attacker with administrative privileges and access to a local account could pre-groom the memory and physically disconnect or unload a module. The attacker must be able to access either of these two events to trigger the use-after-free, and then race the access to the use-after-free, to create a situation where key USB structs can be manipulated into corrupting memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19523" }, { "category": "external", "summary": "RHBZ#1783434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783434" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19523", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19523" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19523", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19523" } ], "release_date": "2019-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "As the system module will be auto-loaded when a device that uses the driver is attached (via USB), its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install adutux /bin/true\" \u003e\u003e /etc/modprobe.d/disable-adutux.conf\n \nThe system will need to be restarted if the adutux module are loaded. In most circumstances, the kernel modules will be unable to be unloaded while any hardware is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver" }, { "cve": "CVE-2019-19528", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1783507" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in iowarrior_disconnect in iowarrior USB driver module were a flag was simultaneously modified causing a race between a device open and disconnect. This flaw could allow a physical attacker to cause a denial of service (DoS) attack. This vulnerability could even lead to a kernel information leak problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19528" }, { "category": "external", "summary": "RHBZ#1783507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783507" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19528", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19528" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19528", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19528" } ], "release_date": "2019-10-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "This flaw can be mitigated by preventing the affected USB IO-Warrior driver (iowarrior) kernel module from loading during the boot time, ensure the module is added into the blacklist file.\n~~~\nRefer: \nHow do I blacklist a kernel module to prevent it from loading automatically? \nhttps://access.redhat.com/solutions/41278\n~~~", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver" }, { "cve": "CVE-2020-0431", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2021-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919889" } ], "notes": [ { "category": "description", "text": "A flaw out of bounds write in the Linux kernel human interface devices subsystem was found in the way user calls find key code by index. A local user could use this flaw to crash the system or escalate privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible out of bounds write in kbd_keycode of keyboard.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "RHBZ#1919889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919889" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0431", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0431" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0431", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0431" }, { "category": "external", "summary": "https://patchwork.kernel.org/project/linux-input/patch/20191207210518.GA181006@dtor-ws/", "url": "https://patchwork.kernel.org/project/linux-input/patch/20191207210518.GA181006@dtor-ws/" } ], "release_date": "2021-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible out of bounds write in kbd_keycode of keyboard.c" }, { "cve": "CVE-2020-11608", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-04-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1833445" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the ov519 driver in the Linux kernel handled certain types of USB descriptors. This flaw allows an attacker with the ability to induce the error conditions to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Low impact because of the preconditions needed to trigger the issue (physical access).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11608" }, { "category": "external", "summary": "RHBZ#1833445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833445" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11608", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11608" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11608", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11608" } ], "release_date": "2020-03-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module gspca_ov519. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278 .", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c" }, { "cve": "CVE-2020-12114", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848652" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the pivot_root syscall. This flaw allows a local privileged user (root outside or root inside a privileged container) to exploit a race condition to manipulate the reference count of the root filesystem. To be able to abuse this flaw, the process or user calling pivot_root must have advanced permissions. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: DoS by corrupting mountpoint reference counter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "RHBZ#1848652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12114", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12114" } ], "release_date": "2020-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: DoS by corrupting mountpoint reference counter" }, { "cve": "CVE-2020-12362", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930246" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. An integer overflow in the firmware for some Intel(R) Graphics Drivers may allow a privileged user to potentially enable an escalation of privilege via local access. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "Only users that specify i915.enable_guc=-1 or i915.enable_guc=1 or 2 are open to be exploited by this issue.\n\nDue to the full fix (combination of kernel and firmware updates) being invasive and GUC firmware loading is off by default, Red Hat Enterprise Linux kernel versions prior to the Linux kernel version shipped with Red Hat Enterprise Linux 8.4 GA (kernel-4.18.0-305.el8) print a warning in the kernel log (\"GUC firmware is insecure - CVE 2020-12362 - Please update to a newer release to get secure GUC\") and do not rely on the firmware fix. As a result, Red Hat Enterprise Linux versions prior Red Hat Enterprise Linux 8.4 GA (including Red Hat Enterprise Linux 6 and 7) do not include the updated firmware packages.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12362" }, { "category": "external", "summary": "RHBZ#1930246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930246" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12362" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Integer overflow in Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12363", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930249" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Improper input validation in some Intel(R) Graphics Drivers may allow a privileged user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper input validation in some Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12363" }, { "category": "external", "summary": "RHBZ#1930249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12363", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12363" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper input validation in some Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12364", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930251" } ], "notes": [ { "category": "description", "text": "Null pointer reference in some Intel(R) Graphics Drivers for Microsoft Windows and the Linux kernel may allow a privileged user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers", "title": "Vulnerability summary" }, { "category": "other", "text": "To fix this issue a combination of linux-firmware and kernel update is required to be installed on the system.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12364" }, { "category": "external", "summary": "RHBZ#1930251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930251" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12364", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12364" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Null pointer dereference in some Intel(R) Graphics Drivers" }, { "cve": "CVE-2020-12464", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-04-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1831726" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in usb_sg_cancel in drivers/usb/core/message.c in the USB core subsystem. This flaw allows a local attacker with a special user or root privileges to crash the system due to a race problem in the scatter-gather cancellation and transfer completion in usb_sg_wait. This vulnerability can also lead to a leak of internal kernel information.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "RHBZ#1831726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12464", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12464" } ], "release_date": "2020-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c" }, { "acknowledgments": [ { "names": [ "Jay Shin" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-14314", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-06-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853922" } ], "notes": [ { "category": "description", "text": "A memory out-of-bounds read flaw was found in the Linux kernel\u0027s ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer uses out of index in ext3/4 filesystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "RHBZ#1853922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853922" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14314", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14314" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14314", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14314" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5872331b3d91820e14716632ebb56b1399b34fe1" }, { "category": "external", "summary": "https://lore.kernel.org/linux-ext4/f53e246b-647c-64bb-16ec-135383c70ad7@redhat.com/T/#u", "url": "https://lore.kernel.org/linux-ext4/f53e246b-647c-64bb-16ec-135383c70ad7@redhat.com/T/#u" } ], "release_date": "2020-06-05T16:45:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "If any directories of the partition (or image) broken, the command \"e2fsck -Df .../partition-name\" fixes it.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer uses out of index in ext3/4 filesystem" }, { "acknowledgments": [ { "names": [ "Adam Zabrocki" ], "organization": "pi3.com.pl" } ], "cve": "CVE-2020-14356", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-07-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1868453" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s cgroupv2 subsystem when rebooting the system. This flaw allows a local user to crash the system or escalate their privileges. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use After Free vulnerability in cgroup BPF component", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because only local user can trigger it and no way to trigger it before reboot happens (until user have complete privileges for accessing cgroupv2).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "RHBZ#1868453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14356", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14356" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14356", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14356" } ], "release_date": "2020-05-31T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use After Free vulnerability in cgroup BPF component" }, { "acknowledgments": [ { "names": [ "Yang Yingliang" ] } ], "cve": "CVE-2020-15437", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901161" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s UART 8250 functionality, in the way certain hardware architectures handled situations where default ports (0x2E8, 0x2F8, 0x3E8, 0x3F8) are not available. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because the issue can only be triggered by an authorized local user in the tty or in the dialout group.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15437" }, { "category": "external", "summary": "RHBZ#1901161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15437", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15437" } ], "release_date": "2020-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: NULL pointer dereference in serial8250_isa_init_ports function in drivers/tty/serial/8250/8250_core.c" }, { "cve": "CVE-2020-24394", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2020-06-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1869141" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in NFSv4.2 in the Linux kernel, where a server fails to correctly apply umask when creating a new object on filesystem without ACL support (for example, ext4 with the \"noacl\" mount option). This flaw allows a local attacker with a user privilege to cause a kernel information leak problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: umask not applied on filesystem without ACL support", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24394" }, { "category": "external", "summary": "RHBZ#1869141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24394", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24394" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24394", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24394" } ], "release_date": "2020-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: umask not applied on filesystem without ACL support" }, { "cve": "CVE-2020-25212", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2020-09-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1877575" } ], "notes": [ { "category": "description", "text": "A flaw was found in the NFSv4 implementation where when mounting a remote attacker controlled server it could return specially crafted response allow for local memory corruption and possibly privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: TOCTOU mismatch in the NFS client code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "RHBZ#1877575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25212", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25212" } ], "release_date": "2020-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "While there is no known mitigation to this flaw, configuring authentication and only mounting authenticated NFSv4 servers will significantly reduce the risk of this flaw being successfully exploited.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: TOCTOU mismatch in the NFS client code" }, { "cve": "CVE-2020-25284", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2020-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882594" } ], "notes": [ { "category": "description", "text": "A flaw was found in the capabilities check of the rados block device functionality in the Linux kernel. Incorrect capability checks could alllow a local user with root priviledges (but no capabilities) to add or remove Rados Block Devices from the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: incomplete permission checking for access to rbd devices", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "RHBZ#1882594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882594" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25284", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25284" } ], "release_date": "2020-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "As the rbd module can be loaded by a priviledged user or process, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install rbd /bin/true\" \u003e\u003e /etc/modprobe.d/disable-rdb.conf \n \nThe system will need to be restarted if the modules isloaded. In most circumstances, the rbd kernel modules will be unable to be unloaded while in use.\n\nIf the system requires this module to work correctly, (Such as a CEPH node) this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: incomplete permission checking for access to rbd devices" }, { "cve": "CVE-2020-25285", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1882591" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels sysctl handling code for hugepages management. When multiple root level processes would write to modify the /proc/sys/vm/nr_hugepages file it could create a race on internal variables leading to a system crash or memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact as access to write to /proc/sys/vm/nr_hugepages is restricted to root and not available to regular users.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "RHBZ#1882591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882591" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25285", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25285" } ], "release_date": "2020-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: race condition between hugetlb sysctl handlers in mm/hugetlb.c" }, { "acknowledgments": [ { "names": [ "ChenNan Of Chaitin" ], "organization": "Security Research Lab" } ], "cve": "CVE-2020-25643", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2020-09-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879981" } ], "notes": [ { "category": "description", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as a having Moderate impact, because the bug can be triggered only if PPP protocol enabled.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "RHBZ#1879981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879981" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25643", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25643" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25643" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105" } ], "release_date": "2020-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "To mitigate this issue, prevent modules hdlc_ppp, syncppp from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow" }, { "cve": "CVE-2020-25704", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2020-11-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1895961" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the Linux kernel\u2019s performance monitoring subsystem when using PERF_EVENT_IOC_SET_FILTER. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: perf_event_parse_addr_filter memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "RHBZ#1895961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895961" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25704", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25704" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25704" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/11/09/1", "url": "https://www.openwall.com/lists/oss-security/2020/11/09/1" } ], "release_date": "2020-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: perf_event_parse_addr_filter memory" }, { "cve": "CVE-2020-27786", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1900933" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in kernel midi subsystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27786" }, { "category": "external", "summary": "RHBZ#1900933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27786", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27786" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d" } ], "release_date": "2020-12-02T02:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "As the midi module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install snd-rawmidi /bin/true\" \u003e\u003e /etc/modprobe.d/disable-snd-rawmidi.conf\n\nThe system will need to be restarted if the snd-rawmidi modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while any midi / sound devices are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in kernel midi subsystem" }, { "cve": "CVE-2020-27835", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901709" } ], "notes": [ { "category": "description", "text": "A flaw use after free in the Linux kernel infiniband hfi1 driver was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: child process is able to access parent mm through hfi dev file handle", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because the issue can only be triggered by an authorized local user with access to a system with specific hardware present.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27835" }, { "category": "external", "summary": "RHBZ#1901709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901709" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27835", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27835" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27835", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27835" } ], "release_date": "2020-11-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module hfi1 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to denylist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: child process is able to access parent mm through hfi dev file handle" }, { "acknowledgments": [ { "names": [ "Yuan Ming \u003cyuanmingbuaa@gmail com\u003e" ], "organization": "Tsinghua University" } ], "cve": "CVE-2020-28974", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903126" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) SLAB memory access flaw was found in the Linux kernel\u0027s fbcon driver module. A bounds check failure allows a local attacker with special user privileges to gain access to out-of-bounds memory, leading to a system crash or leaking of internal kernel information. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: slab-out-of-bounds read in fbcon", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28974" }, { "category": "external", "summary": "RHBZ#1903126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903126" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28974", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28974" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28974", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28974" } ], "release_date": "2020-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Add \u0027nomodeset\u0027 option as kernel boot parameter to disable frame buffering in /etc/default/grub, and run \u0027grub2-mkconfig -o /boot/grub2/grub.cfg\u0027 and reboot.\n~~~\n# cat /proc/cmdline \nBOOT_IMAGE=(hd0,msdos1)/vmlinuz-4.18.0-147.el8.x86_64 root=/dev/mapper/rhel_rhel8u2--1-root ro crashkernel=auto resume=/dev/mapper/rhel_rhel8u2--1-swap rd.lvm.lv=rhel_rhel8u2-1/root rd.lvm.lv=rhel_rhel8u2-1/swap nomodeset\n\n# ls -l /dev/fb*\nls: cannot access \u0027/dev/fb*\u0027: No such file or directory\n~~~\n\nThe above said mitigation does not so effect for rhel6 kernel , and is only applicable for rhel7/8.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: slab-out-of-bounds read in fbcon" }, { "acknowledgments": [ { "names": [ "Eddy Wu" ], "organization": "trendmicro.com" } ], "cve": "CVE-2020-35508", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "discovery_date": "2020-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1902724" } ], "notes": [ { "category": "description", "text": "A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent", "title": "Vulnerability summary" }, { "category": "other", "text": "The incorrect initialization of the process id affects Red Hat Enterprise Linux only.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35508" }, { "category": "external", "summary": "RHBZ#1902724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35508", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35508" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35508" } ], "release_date": "2020-12-09T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fork: fix copy_process(CLONE_PARENT) race with the exiting -\u003ereal_parent" }, { "cve": "CVE-2020-36694", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2212140" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the packet processing context in net/netfilter/x_tables.c in netfilter in the Linux Kernel. This issue occurs when the per-CPU sequence count is mishandled during concurrent iptables rules replacement and can be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: use-after-free in the packet processing context", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36694" }, { "category": "external", "summary": "RHBZ#2212140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36694", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36694" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36694" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c" } ], "release_date": "2023-05-22T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: netfilter: use-after-free in the packet processing context" }, { "cve": "CVE-2021-0342", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1915799" } ], "notes": [ { "category": "description", "text": "A flaw use after free in the Linux kernel TUN/TAP device driver functionality was found in the way user create and use tun/tap device. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges and non-standard configuration of the networking device.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0342" }, { "category": "external", "summary": "RHBZ#1915799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915799" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0342", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0342" }, { "category": "external", "summary": "https://lore.kernel.org/netdev/20200608230607.3361041-84-sashal@kernel.org/", "url": "https://lore.kernel.org/netdev/20200608230607.3361041-84-sashal@kernel.org/" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module tun from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use after free in tun_get_user of tun.c could lead to local escalation of privilege" }, { "cve": "CVE-2021-0605", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-06-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1974823" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s pfkey_dump function trusted the provided filter size parameters. A local, sufficiently privileged user could use this flaw to leak information from the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0605" }, { "category": "external", "summary": "RHBZ#1974823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0605", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0605" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0605", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0605" } ], "release_date": "2021-06-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "If the CAP_NET_ADMIN capability is privileged by default (which is true for Red Hat Enterprise Linux 7), then only an otherwise privileged user can trigger this bug. \n\nOn Red Hat Enterprise Linux 8 CAP_NET_ADMIN capability can be also gained by exploiting unprivileged user namespaces. The mitigation is to disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: In pfkey_dump() dplen and splen can both be specified to access the xfrm_address_t structure out of bounds" }, { "cve": "CVE-2021-3428", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-01-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1936786" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: integer overflow in ext4_es_cache_extent", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3428" }, { "category": "external", "summary": "RHBZ#1936786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3428", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3428" } ], "release_date": "2021-01-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: integer overflow in ext4_es_cache_extent" }, { "acknowledgments": [ { "names": [ "Remy" ], "organization": "GreyNoiseIO" } ], "cve": "CVE-2023-1390", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2022-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178212" } ], "notes": [ { "category": "description", "text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remote DoS in TIPC kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this issue as they did not include the affected code in `tipc_link_xmit`, introduced in upstream kernel version 4.3 (commit af9b028 \"tipc: make media xmit call outside node spinlock context\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "RHBZ#2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "category": "external", "summary": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "category": "external", "summary": "https://infosec.exchange/@_mattata/109427999461122360", "url": "https://infosec.exchange/@_mattata/109427999461122360" } ], "release_date": "2021-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T16:07:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1739" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "NFV-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "NFV-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.src", "RT-8.4.0.GA:kernel-rt-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-core-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-devel-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-kvm-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-0:4.18.0-305.rt7.72.el8.x86_64", "RT-8.4.0.GA:kernel-rt-modules-extra-0:4.18.0-305.rt7.72.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remote DoS in TIPC kernel module" } ] }
rhsa-2023:3190
Vulnerability from csaf_redhat
Published
2023-05-17 15:27
Modified
2025-08-02 15:52
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)
* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461)\n\n* kernel: remote DoS in TIPC kernel module (CVE-2023-1390)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:3190", "url": "https://access.redhat.com/errata/RHSA-2023:3190" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3190.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T15:52:09+00:00", "generator": { "date": "2025-08-02T15:52:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2023:3190", "initial_release_date": "2023-05-17T15:27:55+00:00", "revision_history": [ { "date": "2023-05-17T15:27:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-05-17T15:27:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T15:52:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "perf-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "perf-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.83.1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.83.1.el8_1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "perf-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "perf-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.83.1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.83.1.el8_1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-147.83.1.el8_1.src", "product": { "name": "kernel-0:4.18.0-147.83.1.el8_1.src", "product_id": "kernel-0:4.18.0-147.83.1.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.83.1.el8_1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.83.1.el8_1?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "product": { "name": "kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "product_id": "kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.83.1.el8_1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.83.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.src" }, "product_reference": "kernel-0:4.18.0-147.83.1.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-147.83.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.83.1.el8_1.noarch" }, "product_reference": "kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "perf-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "perf-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-0461", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-02-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2176192" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u2019s TLS protocol functionality in how a user installs a tls context (struct tls_context) on a connected TCP socket. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/ulp: use-after-free in listening ULP sockets", "title": "Vulnerability summary" }, { "category": "other", "text": "Versions of Red Hat Enterprise Linux before 8 are not affected by this vulnerability as they did not include the upstream commit 734942c (\"tcp: ULP infrastructure\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" ], "known_not_affected": [ "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-0461" }, { "category": "external", "summary": "RHBZ#2176192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176192" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0461" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0461" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c", "url": "https://github.com/torvalds/linux/commit/2c02d41d71f90a5168391b6a5f2954112ba2307c" } ], "release_date": "2023-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-17T15:27:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2023:3190" }, { "category": "workaround", "details": "To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net/ulp: use-after-free in listening ULP sockets" }, { "acknowledgments": [ { "names": [ "Remy" ], "organization": "GreyNoiseIO" } ], "cve": "CVE-2023-1390", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2022-11-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178212" } ], "notes": [ { "category": "description", "text": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remote DoS in TIPC kernel module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6 and 7 are not affected by this issue as they did not include the affected code in `tipc_link_xmit`, introduced in upstream kernel version 4.3 (commit af9b028 \"tipc: make media xmit call outside node spinlock context\").", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" ], "known_not_affected": [ "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-1390" }, { "category": "external", "summary": "RHBZ#2178212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1390", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1390" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "category": "external", "summary": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "category": "external", "summary": "https://infosec.exchange/@_mattata/109427999461122360", "url": "https://infosec.exchange/@_mattata/109427999461122360" } ], "release_date": "2021-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-17T15:27:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2023:3190" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.src", "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.83.1.el8_1.noarch", "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.83.1.el8_1.x86_64", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.ppc64le", "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.83.1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remote DoS in TIPC kernel module" } ] }
gsd-2023-1390
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-1390", "id": "GSD-2023-1390" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-1390" ], "details": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "id": "GSD-2023-1390", "modified": "2023-12-13T01:20:42.082932Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2023-1390", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Linux kernel (TIPC kernel module)", "version": { "version_data": [ { "version_value": "Fixed in kernel 5.11-rc4" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-1050" } ] } ] }, "references": { "reference_data": [ { "name": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "refsource": "MISC", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "name": "https://infosec.exchange/@_mattata/109427999461122360", "refsource": "MISC", "url": "https://infosec.exchange/@_mattata/109427999461122360" }, { "name": "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6" }, { "name": "https://security.netapp.com/advisory/ntap-20230420-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20230420-0001/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.9.253", "versionStartIncluding": "4.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.14.217", "versionStartIncluding": "4.10", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.19.170", "versionStartIncluding": "4.15", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.4.92", "versionStartIncluding": "4.20", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.10.10", "versionStartIncluding": "5.5", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2023-1390" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6" }, { "name": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "name": "https://infosec.exchange/@_mattata/109427999461122360", "refsource": "MISC", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://infosec.exchange/@_mattata/109427999461122360" }, { "name": "https://security.netapp.com/advisory/ntap-20230420-0001/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230420-0001/" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-06-07T12:46Z", "publishedDate": "2023-03-16T21:15Z" } } }
ghsa-875q-9h9j-qhmh
Vulnerability from github
Published
2023-07-06 19:24
Modified
2024-04-04 05:34
Severity ?
VLAI Severity ?
Details
A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.
{ "affected": [], "aliases": [ "CVE-2023-1390" ], "database_specific": { "cwe_ids": [ "CWE-1050" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2023-03-16T21:15:00Z", "severity": "HIGH" }, "details": "A remote denial of service vulnerability was found in the Linux kernel\u2019s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.", "id": "GHSA-875q-9h9j-qhmh", "modified": "2024-04-04T05:34:39Z", "published": "2023-07-06T19:24:11Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1390" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6" }, { "type": "WEB", "url": "https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5" }, { "type": "WEB", "url": "https://infosec.exchange/%40_mattata/109427999461122360" }, { "type": "WEB", "url": "https://infosec.exchange/@_mattata/109427999461122360" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20230420-0001" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…